Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2011-3389
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "74829", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/74829" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://eprint.iacr.org/2004/111" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635" }, { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "48692", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48692" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf" }, { "name": "SSRT100805", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "55322", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55322" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5130" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "name": "HPSBUX02730", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2" }, { "name": "SUSE-SU-2012:0602", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "name": "1025997", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025997" }, { "name": "TA12-010A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html" }, { "name": "APPLE-SA-2011-10-12-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "name": "SUSE-SU-2012:0114", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" }, { "name": "49388", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49388" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ekoparty.org/2011/juliano-rizzo.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" }, { "name": "RHSA-2013:1455", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "55351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55351" }, { "name": "SSRT100710", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2" }, { "name": "VU#864643", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/864643" }, { "name": "APPLE-SA-2013-10-22-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "49778", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49778" }, { "name": "DSA-2398", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2398" }, { "name": "48948", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48948" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6150" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://technet.microsoft.com/security/advisory/2588513" }, { "name": "openSUSE-SU-2012:0063", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://hermes.opensuse.org/messages/13155432" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx" }, { "name": "RHSA-2011:1384", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/windows/1151/" }, { "name": "openSUSE-SU-2012:0030", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://hermes.opensuse.org/messages/13154861" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://eprint.iacr.org/2006/136" }, { "name": "48915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48915" }, { "name": "GLSA-201203-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "name": "SSRT100740", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html" }, { "name": "48256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48256" }, { "name": "APPLE-SA-2012-09-19-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "name": "1026103", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026103" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4999" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5501" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.insecure.cl/Beast-SSL.rar" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5001" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/mac/1160/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20120124B.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/support/kb/view/1004/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "name": "1026704", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026704" }, { "name": "APPLE-SA-2012-07-25-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html" }, { "name": "HPSBMU02742", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue" }, { "name": "RHSA-2012:0508", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "name": "45791", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45791" }, { "name": "1029190", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029190" }, { "name": "MDVSA-2012:058", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058" }, { "name": "47998", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47998" }, { "name": "SSRT100867", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49198" }, { "name": "RHSA-2012:0006", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/windows/1160/" }, { "name": "SUSE-SU-2012:0122", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" }, { "name": "HPSBUX02777", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14752", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/unix/1151/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/mac/1151/" }, { "name": "MS12-006", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006" }, { "name": "HPSBUX02760", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.opera.com/docs/changelogs/unix/1160/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5281" }, { "name": "SSRT100854", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "APPLE-SA-2011-10-12-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=719047" }, { "name": "HPSBMU02900", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://vnhacker.blogspot.com/2011/09/beast.html" }, { "name": "USN-1263-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1263-1" }, { "name": "APPLE-SA-2012-05-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "55350", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55350" }, { "name": "HPSBMU02797", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf" }, { "name": "openSUSE-SU-2020:0086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-21T21:06:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "74829", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/74829" }, { "tags": [ "x_refsource_MISC" ], "url": "http://eprint.iacr.org/2004/111" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635" }, { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "48692", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48692" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf" }, { "name": "SSRT100805", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "55322", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55322" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5130" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "name": "HPSBUX02730", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2" }, { "name": "SUSE-SU-2012:0602", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "name": "1025997", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025997" }, { "name": "TA12-010A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html" }, { "name": "APPLE-SA-2011-10-12-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "name": "SUSE-SU-2012:0114", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" }, { "name": "49388", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49388" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ekoparty.org/2011/juliano-rizzo.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" }, { "name": "RHSA-2013:1455", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "55351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55351" }, { "name": "SSRT100710", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2" }, { "name": "VU#864643", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/864643" }, { "name": "APPLE-SA-2013-10-22-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "49778", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49778" }, { "name": "DSA-2398", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2398" }, { "name": "48948", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48948" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6150" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://technet.microsoft.com/security/advisory/2588513" }, { "name": "openSUSE-SU-2012:0063", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://hermes.opensuse.org/messages/13155432" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx" }, { "name": "RHSA-2011:1384", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/windows/1151/" }, { "name": "openSUSE-SU-2012:0030", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://hermes.opensuse.org/messages/13154861" }, { "tags": [ "x_refsource_MISC" ], "url": "http://eprint.iacr.org/2006/136" }, { "name": "48915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48915" }, { "name": "GLSA-201203-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "name": "SSRT100740", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html" }, { "name": "48256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48256" }, { "name": "APPLE-SA-2012-09-19-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "name": "1026103", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026103" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4999" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5501" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.insecure.cl/Beast-SSL.rar" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5001" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/mac/1160/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20120124B.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/support/kb/view/1004/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "name": "1026704", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026704" }, { "name": "APPLE-SA-2012-07-25-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html" }, { "name": "HPSBMU02742", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue" }, { "name": "RHSA-2012:0508", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "name": "45791", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45791" }, { "name": "1029190", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029190" }, { "name": "MDVSA-2012:058", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058" }, { "name": "47998", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47998" }, { "name": "SSRT100867", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49198" }, { "name": "RHSA-2012:0006", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/windows/1160/" }, { "name": "SUSE-SU-2012:0122", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" }, { "name": "HPSBUX02777", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14752", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/unix/1151/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/mac/1151/" }, { "name": "MS12-006", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006" }, { "name": "HPSBUX02760", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.opera.com/docs/changelogs/unix/1160/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5281" }, { "name": "SSRT100854", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "APPLE-SA-2011-10-12-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=719047" }, { "name": "HPSBMU02900", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862" }, { "tags": [ "x_refsource_MISC" ], "url": "http://vnhacker.blogspot.com/2011/09/beast.html" }, { "name": "USN-1263-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1263-1" }, { "name": "APPLE-SA-2012-05-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "55350", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55350" }, { "name": "HPSBMU02797", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf" }, { "name": "openSUSE-SU-2020:0086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3389", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "74829", "refsource": "OSVDB", "url": "http://osvdb.org/74829" }, { "name": "http://eprint.iacr.org/2004/111", "refsource": "MISC", "url": "http://eprint.iacr.org/2004/111" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635", "refsource": "MISC", "url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "48692", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48692" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf", "refsource": "CONFIRM", "url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf" }, { "name": "SSRT100805", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "55322", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55322" }, { "name": "http://support.apple.com/kb/HT5130", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5130" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=737506", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "name": "HPSBUX02730", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2" }, { "name": "SUSE-SU-2012:0602", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "name": "1025997", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025997" }, { "name": "TA12-010A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html" }, { "name": "APPLE-SA-2011-10-12-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "name": "SUSE-SU-2012:0114", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" }, { "name": "49388", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49388" }, { "name": "http://ekoparty.org/2011/juliano-rizzo.php", "refsource": "MISC", "url": "http://ekoparty.org/2011/juliano-rizzo.php" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2016-001.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" }, { "name": "RHSA-2013:1455", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "55351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55351" }, { "name": "SSRT100710", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2" }, { "name": "VU#864643", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/864643" }, { "name": "APPLE-SA-2013-10-22-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "49778", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49778" }, { "name": "DSA-2398", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2398" }, { "name": "48948", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48948" }, { "name": "http://support.apple.com/kb/HT6150", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6150" }, { "name": "APPLE-SA-2012-02-01-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "http://technet.microsoft.com/security/advisory/2588513", "refsource": "CONFIRM", "url": "http://technet.microsoft.com/security/advisory/2588513" }, { "name": "openSUSE-SU-2012:0063", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/13155432" }, { "name": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx", "refsource": "CONFIRM", "url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx" }, { "name": "RHSA-2011:1384", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html" }, { "name": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx", "refsource": "CONFIRM", "url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx" }, { "name": "http://www.opera.com/docs/changelogs/windows/1151/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/windows/1151/" }, { "name": "openSUSE-SU-2012:0030", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/13154861" }, { "name": "http://eprint.iacr.org/2006/136", "refsource": "MISC", "url": "http://eprint.iacr.org/2006/136" }, { "name": "48915", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48915" }, { "name": "GLSA-201203-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "name": "SSRT100740", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2" }, { "name": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html", "refsource": "MISC", "url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html" }, { "name": "48256", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48256" }, { "name": "APPLE-SA-2012-09-19-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "name": "1026103", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026103" }, { "name": "http://support.apple.com/kb/HT4999", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4999" }, { "name": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html", "refsource": "CONFIRM", "url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html" }, { "name": "http://support.apple.com/kb/HT5501", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5501" }, { "name": "http://www.insecure.cl/Beast-SSL.rar", "refsource": "MISC", "url": "http://www.insecure.cl/Beast-SSL.rar" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02" }, { "name": "http://support.apple.com/kb/HT5001", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5001" }, { "name": "http://www.opera.com/docs/changelogs/mac/1160/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/mac/1160/" }, { "name": "http://curl.haxx.se/docs/adv_20120124B.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20120124B.html" }, { "name": "http://www.opera.com/support/kb/view/1004/", "refsource": "CONFIRM", "url": "http://www.opera.com/support/kb/view/1004/" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "name": "1026704", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026704" }, { "name": "APPLE-SA-2012-07-25-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html" }, { "name": "HPSBMU02742", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2" }, { "name": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue", "refsource": "CONFIRM", "url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue" }, { "name": "RHSA-2012:0508", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "name": "45791", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45791" }, { "name": "1029190", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029190" }, { "name": "MDVSA-2012:058", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058" }, { "name": "47998", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47998" }, { "name": "SSRT100867", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49198" }, { "name": "RHSA-2012:0006", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html" }, { "name": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/", "refsource": "CONFIRM", "url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/" }, { "name": "http://www.opera.com/docs/changelogs/windows/1160/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/windows/1160/" }, { "name": "SUSE-SU-2012:0122", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" }, { "name": "HPSBUX02777", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14752", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752" }, { "name": "http://www.opera.com/docs/changelogs/unix/1151/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/unix/1151/" }, { "name": "http://www.opera.com/docs/changelogs/mac/1151/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/mac/1151/" }, { "name": "MS12-006", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006" }, { "name": "HPSBUX02760", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "http://www.opera.com/docs/changelogs/unix/1160/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/unix/1160/" }, { "name": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" }, { "name": "http://support.apple.com/kb/HT5281", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5281" }, { "name": "SSRT100854", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "APPLE-SA-2011-10-12-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=719047", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=719047" }, { "name": "HPSBMU02900", "refsource": "HP", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862" }, { "name": "http://vnhacker.blogspot.com/2011/09/beast.html", "refsource": "MISC", "url": "http://vnhacker.blogspot.com/2011/09/beast.html" }, { "name": "USN-1263-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1263-1" }, { "name": "APPLE-SA-2012-05-09-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "55350", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55350" }, { "name": "HPSBMU02797", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "http://www.ibm.com/developerworks/java/jdk/alerts/", "refsource": "CONFIRM", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf" }, { "name": "openSUSE-SU-2020:0086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-3389", "datePublished": "2011-09-06T19:00:00", "dateReserved": "2011-09-05T00:00:00", "dateUpdated": "2024-08-06T23:29:56.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-3389\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-09-06T19:55:03.197\",\"lastModified\":\"2024-11-21T01:30:25.357\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \\\"BEAST\\\" attack.\"},{\"lang\":\"es\",\"value\":\"El protocolo SSL, como se utiliza en ciertas configuraciones en Microsoft Windows y Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera y otros productos, cifra los datos mediante el uso del modo CBC con vectores de inicializaci\u00f3n encadenados, lo que permite a atacantes man-in-the-middle obtener cabeceras HTTP en texto plano a trav\u00e9s de un ataque blockwise chosen-boundary (BCBA) en una sesi\u00f3n HTTPS, junto con el c\u00f3digo de JavaScript que usa (1) la API WebSocket HTML5, (2) la API Java URLConnection o (3) la API Silverlight WebClient, tambi\u00e9n conocido como un ataque \\\"BEAST\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39B565E1-C2F1-44FC-A517-E3130332B17C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C37BA825-679F-4257-9F2B-CE2318B75396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D4FFCF-5309-43B6-9FD5-680C6D535A7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4545786D-3129-4D92-B218-F4A92428ED48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_rf68xr_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.1\",\"matchCriteriaId\":\"416A895C-F973-4C13-AB9B-32D56B32C14B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_rf68xr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB562D2A-9B77-42DD-A49B-F5E909E69589\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_rf615r_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.1\",\"matchCriteriaId\":\"46F9E136-5346-4761-A60B-1A1F12DD75BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_rf615r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2310C8A4-DFE4-44E4-B840-2FF1744F785D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.10.6\",\"versionEndIncluding\":\"7.23.1\",\"matchCriteriaId\":\"5320D044-368E-450B-B658-E861ABECA82C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0554C89-3716-49F3-BFAE-E008D5E4E29C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6D0378-F0F4-4AAA-80AF-8287C790EC96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87614B58-24AB-49FB-9C84-E8DDBA16353B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF49D26F-142E-468B-87C1-BABEA445255C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4174F4F-149E-41A6-BBCC-D01114C05F38\"}]}]}],\"references\":[{\"url\":\"http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://curl.haxx.se/docs/adv_20120124B.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2016-001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://ekoparty.org/2011/juliano-rizzo.php\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://eprint.iacr.org/2004/111\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://eprint.iacr.org/2006/136\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://isc.sans.edu/diary/SSL+TLS+part+3+/11635\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://osvdb.org/74829\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0508.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1455.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/45791\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/47998\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48256\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48692\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48915\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48948\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/49198\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55322\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55350\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55351\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201203-02.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4999\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5001\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5130\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5281\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT5501\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT6150\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://technet.microsoft.com/security/advisory/2588513\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://vnhacker.blogspot.com/2011/09/beast.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2398\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ibm.com/developerworks/java/jdk/alerts/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.imperialviolet.org/2011/09/23/chromeandbeast.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.insecure.cl/Beast-SSL.rar\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Patch\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/864643\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:058\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.opera.com/docs/changelogs/mac/1151/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/mac/1160/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/unix/1151/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/unix/1160/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/windows/1151/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/windows/1160/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/support/kb/view/1004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1384.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2012-0006.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/49388\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/49778\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1029190\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1025997\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1026103\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1026704\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1263-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA12-010A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=719047\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=737506\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hermes.opensuse.org/messages/13154861\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hermes.opensuse.org/messages/13155432\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://curl.haxx.se/docs/adv_20120124B.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://downloads.asterisk.org/pub/security/AST-2016-001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://ekoparty.org/2011/juliano-rizzo.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://eprint.iacr.org/2004/111\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://eprint.iacr.org/2006/136\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://isc.sans.edu/diary/SSL+TLS+part+3+/11635\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://osvdb.org/74829\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0508.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1455.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/45791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/47998\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48692\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/48948\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/49198\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55322\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55350\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/55351\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201203-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4999\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5281\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT5501\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT6150\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://technet.microsoft.com/security/advisory/2588513\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://vnhacker.blogspot.com/2011/09/beast.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2012/dsa-2398\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.ibm.com/developerworks/java/jdk/alerts/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.imperialviolet.org/2011/09/23/chromeandbeast.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.insecure.cl/Beast-SSL.rar\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/864643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:058\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.opera.com/docs/changelogs/mac/1151/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/mac/1160/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/unix/1151/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/unix/1160/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/windows/1151/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/docs/changelogs/windows/1160/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.opera.com/support/kb/view/1004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1384.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2012-0006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/49388\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/49778\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1029190\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1025997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1026103\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1026704\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1263-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA12-010A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=719047\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=737506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hermes.opensuse.org/messages/13154861\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://hermes.opensuse.org/messages/13155432\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2012_0508
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.5.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3557,\nCVE-2011-3560, CVE-2011-3563, CVE-2012-0498, CVE-2012-0499, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507)\n\nAll users of java-1.5.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.5.0 SR13-FP1 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0508", "url": "https://access.redhat.com/errata/RHSA-2012:0508" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0508.json" } ], "title": "Red Hat Security Advisory: java-1.5.0-ibm security update", "tracking": { "current_release_date": "2024-11-14T11:30:58+00:00", "generator": { "date": "2024-11-14T11:30:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0508", "initial_release_date": "2012-04-23T16:52:00+00:00", "revision_history": [ { "date": "2012-04-23T16:52:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-11-14T19:09:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:30:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3389", "discovery_date": "2011-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "737506" } ], "notes": [ { "category": "description", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3389" }, { "category": "external", "summary": "RHBZ#737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389" } ], "release_date": "2011-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)" }, { "cve": "CVE-2011-3557", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745464" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3557" }, { "category": "external", "summary": "RHBZ#745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)" }, { "cve": "CVE-2011-3560", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745379" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3560" }, { "category": "external", "summary": "RHBZ#745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)" }, { "cve": "CVE-2011-3563", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3563" }, { "category": "external", "summary": "RHBZ#789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)" }, { "cve": "CVE-2012-0498", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790720" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0498" }, { "category": "external", "summary": "RHBZ#790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0499", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790722" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0499" }, { "category": "external", "summary": "RHBZ#790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0501", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788624" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0501" }, { "category": "external", "summary": "RHBZ#788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)" }, { "cve": "CVE-2012-0502", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789297" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0502" }, { "category": "external", "summary": "RHBZ#789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)" }, { "cve": "CVE-2012-0503", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788976" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0503" }, { "category": "external", "summary": "RHBZ#788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)" }, { "cve": "CVE-2012-0505", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0505" }, { "category": "external", "summary": "RHBZ#789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)" }, { "cve": "CVE-2012-0506", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0506" }, { "category": "external", "summary": "RHBZ#789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)" }, { "cve": "CVE-2012-0507", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0507" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0507" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" } ] }
rhsa-2011_1380
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nA flaw was found in the Java RMI (Remote Method Invocation) registry\nimplementation. A remote RMI client could use this flaw to execute\narbitrary code on the RMI server running the registry. (CVE-2011-3556)\n\nA flaw was found in the Java RMI registry implementation. A remote RMI\nclient could use this flaw to execute code on the RMI server with\nunrestricted privileges. (CVE-2011-3557)\n\nA flaw was found in the IIOP (Internet Inter-Orb Protocol) deserialization\ncode. An untrusted Java application or applet running in a sandbox could\nuse this flaw to bypass sandbox restrictions by deserializing\nspecially-crafted input. (CVE-2011-3521)\n\nIt was found that the Java ScriptingEngine did not properly restrict the\nprivileges of sandboxed applications. An untrusted Java application or\napplet running in a sandbox could use this flaw to bypass sandbox\nrestrictions. (CVE-2011-3544)\n\nA flaw was found in the AWTKeyStroke implementation. An untrusted Java\napplication or applet running in a sandbox could use this flaw to bypass\nsandbox restrictions. (CVE-2011-3548)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the Java2D code used to perform transformations of graphic shapes\nand images. An untrusted Java application or applet running in a sandbox\ncould use this flaw to bypass sandbox restrictions. (CVE-2011-3551)\n\nAn insufficient error checking flaw was found in the unpacker for JAR files\nin pack200 format. A specially-crafted JAR file could use this flaw to\ncrash the Java Virtual Machine (JVM) or, possibly, execute arbitrary code\nwith JVM privileges. (CVE-2011-3554)\n\nIt was found that HttpsURLConnection did not perform SecurityManager checks\nin the setSSLSocketFactory method. An untrusted Java application or applet\nrunning in a sandbox could use this flaw to bypass connection restrictions\ndefined in the policy. (CVE-2011-3560)\n\nA flaw was found in the way the SSL 3 and TLS 1.0 protocols used block\nciphers in cipher-block chaining (CBC) mode. An attacker able to perform a\nchosen plain text attack against a connection mixing trusted and untrusted\ndata could use this flaw to recover portions of the trusted data sent over\nthe connection. (CVE-2011-3389)\n\nNote: This update mitigates the CVE-2011-3389 issue by splitting the first\napplication data record byte to a separate SSL/TLS protocol record. This\nmitigation may cause compatibility issues with some SSL/TLS implementations\nand can be disabled using the jsse.enableCBCProtection boolean property.\nThis can be done on the command line by appending the flag\n\"-Djsse.enableCBCProtection=false\" to the java command.\n\nAn information leak flaw was found in the InputStream.skip implementation.\nAn untrusted Java application or applet could possibly use this flaw to\nobtain bytes skipped by other threads. (CVE-2011-3547)\n\nA flaw was found in the Java HotSpot virtual machine. An untrusted Java\napplication or applet could use this flaw to disclose portions of the VM\nmemory, or cause it to crash. (CVE-2011-3558)\n\nThe Java API for XML Web Services (JAX-WS) implementation in OpenJDK was\nconfigured to include the stack trace in error messages sent to clients. A\nremote client could possibly use this flaw to obtain sensitive information.\n(CVE-2011-3553)\n\nIt was found that Java applications running with SecurityManager\nrestrictions were allowed to use too many UDP sockets by default. If\nmultiple instances of a malicious application were started at the same\ntime, they could exhaust all available UDP sockets on the system.\n(CVE-2011-3552)\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.9.10. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1380", "url": "https://access.redhat.com/errata/RHSA-2011:1380" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "category": "external", "summary": "http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS", "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS" }, { "category": "external", "summary": "737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "745492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1380.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-openjdk security update", "tracking": { "current_release_date": "2024-11-14T11:30:14+00:00", "generator": { "date": "2024-11-14T11:30:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:1380", "initial_release_date": "2011-10-18T23:19:00+00:00", "revision_history": [ { "date": "2011-10-18T23:19:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-10-18T19:26:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:30:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.40.1.9.10.el6_1?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.23.1.9.10.el5_7?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "relates_to_product_reference": "6Server-optional-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "relates_to_product_reference": "6Server-optional-6.1.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3389", "discovery_date": "2011-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "737506" } ], "notes": [ { "category": "description", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3389" }, { "category": "external", "summary": "RHBZ#737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389" } ], "release_date": "2011-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)" }, { "cve": "CVE-2011-3521", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745442" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3521" }, { "category": "external", "summary": "RHBZ#745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3521" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)" }, { "cve": "CVE-2011-3544", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745399" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3544" }, { "category": "external", "summary": "RHBZ#745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3544" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)" }, { "cve": "CVE-2011-3547", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3547" }, { "category": "external", "summary": "RHBZ#745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)" }, { "cve": "CVE-2011-3548", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745473" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3548" }, { "category": "external", "summary": "RHBZ#745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)" }, { "cve": "CVE-2011-3551", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745391" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3551" }, { "category": "external", "summary": "RHBZ#745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)" }, { "cve": "CVE-2011-3552", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745397" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3552" }, { "category": "external", "summary": "RHBZ#745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3552" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)" }, { "cve": "CVE-2011-3553", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745476" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3553" }, { "category": "external", "summary": "RHBZ#745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3553" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)" }, { "cve": "CVE-2011-3554", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745447" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3554" }, { "category": "external", "summary": "RHBZ#745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)" }, { "cve": "CVE-2011-3556", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745459" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3556" }, { "category": "external", "summary": "RHBZ#745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)" }, { "cve": "CVE-2011-3557", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745464" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3557" }, { "category": "external", "summary": "RHBZ#745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)" }, { "cve": "CVE-2011-3558", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745492" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3558" }, { "category": "external", "summary": "RHBZ#745492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3558", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)" }, { "cve": "CVE-2011-3560", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745379" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3560" }, { "category": "external", "summary": "RHBZ#745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-18T23:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1380" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Client-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Client-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.src", "5Server-5.7.Z:java-1.6.0-openjdk-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.i386", "5Server-5.7.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.23.1.9.10.el5_7.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.src", "6Server-optional-6.1.z:java-1.6.0-openjdk-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.i686", "6Server-optional-6.1.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.40.1.9.10.el6_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)" } ] }
rhsa-2012_0343
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-ibm-sap packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 4, 5 and 6 for SAP.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.4.2 SR13-FP11 Java release includes the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3545,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560)\n\nAll users of java-1.4.2-ibm-sap are advised to upgrade to these updated\npackages, which contain the IBM 1.4.2 SR13-FP11 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0343", "url": "https://access.redhat.com/errata/RHSA-2012:0343" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0343.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-ibm-sap security update", "tracking": { "current_release_date": "2024-11-14T11:30:46+00:00", "generator": { "date": "2024-11-14T11:30:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0343", "initial_release_date": "2012-02-29T14:46:00+00:00", "revision_history": [ { "date": "2012-02-29T14:46:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-02-29T14:46:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:30:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 4 AS for SAP", "product": { "name": "RHEL 4 AS for SAP", "product_id": "4AS-SAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_sap:4" } } }, { "category": "product_name", "name": "RHEL 5 Server for SAP", "product": { "name": "RHEL 5 Server for SAP", "product_id": "5Server-SAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_sap:5" } } } ], "category": "product_family", "name": "RHEL for SAP" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.11.sap-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.11.sap-1jpp.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-SAP" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3389", "discovery_date": "2011-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "737506" } ], "notes": [ { "category": "description", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3389" }, { "category": "external", "summary": "RHBZ#737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389" } ], "release_date": "2011-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-29T14:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0343" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)" }, { "cve": "CVE-2011-3545", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747191" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3545" }, { "category": "external", "summary": "RHBZ#747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3545" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-29T14:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0343" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)" }, { "cve": "CVE-2011-3547", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3547" }, { "category": "external", "summary": "RHBZ#745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-29T14:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0343" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)" }, { "cve": "CVE-2011-3548", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745473" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3548" }, { "category": "external", "summary": "RHBZ#745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-29T14:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0343" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)" }, { "cve": "CVE-2011-3549", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747198" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3549" }, { "category": "external", "summary": "RHBZ#747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-29T14:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0343" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)" }, { "cve": "CVE-2011-3552", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745397" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3552" }, { "category": "external", "summary": "RHBZ#745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3552" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-29T14:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0343" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)" }, { "cve": "CVE-2011-3556", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745459" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3556" }, { "category": "external", "summary": "RHBZ#745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-29T14:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0343" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)" }, { "cve": "CVE-2011-3557", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745464" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3557" }, { "category": "external", "summary": "RHBZ#745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-29T14:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0343" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)" }, { "cve": "CVE-2011-3560", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745379" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3560" }, { "category": "external", "summary": "RHBZ#745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-29T14:46:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0343" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el4.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.11.sap-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)" } ] }
rhsa-2011_1384
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-sun packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch page, listed in the References section. (CVE-2011-3389,\nCVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551,\nCVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3555, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3558, CVE-2011-3560, CVE-2011-3561)\n\nAll users of java-1.6.0-sun are advised to upgrade to these updated\npackages, which provide JDK and JRE 6 Update 29 and resolve these issues.\nAll running instances of Sun Java must be restarted for the update to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1384", "url": "https://access.redhat.com/errata/RHSA-2011:1384" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "category": "external", "summary": "737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "745492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492" }, { "category": "external", "summary": "747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "747200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200" }, { "category": "external", "summary": "747203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203" }, { "category": "external", "summary": "747205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205" }, { "category": "external", "summary": "747206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747206" }, { "category": "external", "summary": "747208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1384.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-sun security update", "tracking": { "current_release_date": "2024-11-14T11:30:20+00:00", "generator": { "date": "2024-11-14T11:30:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:1384", "initial_release_date": "2011-10-19T17:17:00+00:00", "revision_history": [ { "date": "2011-10-19T17:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-10-19T13:22:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:30:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.29-1jpp.1.el4?arch=i586\u0026epoch=1" } } } ], "category": "architecture", "name": "i586" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3389", "discovery_date": "2011-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "737506" } ], "notes": [ { "category": "description", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3389" }, { "category": "external", "summary": "RHBZ#737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389" } ], "release_date": "2011-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)" }, { "cve": "CVE-2011-3516", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747203" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3516" }, { "category": "external", "summary": "RHBZ#747203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3521", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745442" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3521" }, { "category": "external", "summary": "RHBZ#745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3521" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)" }, { "cve": "CVE-2011-3544", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745399" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3544" }, { "category": "external", "summary": "RHBZ#745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3544" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)" }, { "cve": "CVE-2011-3545", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747191" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3545" }, { "category": "external", "summary": "RHBZ#747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3545" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)" }, { "cve": "CVE-2011-3546", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747205" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3546" }, { "category": "external", "summary": "RHBZ#747205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3547", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3547" }, { "category": "external", "summary": "RHBZ#745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)" }, { "cve": "CVE-2011-3548", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745473" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3548" }, { "category": "external", "summary": "RHBZ#745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)" }, { "cve": "CVE-2011-3549", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747198" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3549" }, { "category": "external", "summary": "RHBZ#747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)" }, { "cve": "CVE-2011-3550", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747200" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3550" }, { "category": "external", "summary": "RHBZ#747200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)" }, { "cve": "CVE-2011-3551", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745391" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3551" }, { "category": "external", "summary": "RHBZ#745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)" }, { "cve": "CVE-2011-3552", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745397" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3552" }, { "category": "external", "summary": "RHBZ#745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3552" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)" }, { "cve": "CVE-2011-3553", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745476" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3553" }, { "category": "external", "summary": "RHBZ#745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3553" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)" }, { "cve": "CVE-2011-3554", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745447" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3554" }, { "category": "external", "summary": "RHBZ#745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)" }, { "cve": "CVE-2011-3556", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745459" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3556" }, { "category": "external", "summary": "RHBZ#745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)" }, { "cve": "CVE-2011-3557", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745464" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3557" }, { "category": "external", "summary": "RHBZ#745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)" }, { "cve": "CVE-2011-3558", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745492" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3558" }, { "category": "external", "summary": "RHBZ#745492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3558", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3558" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)" }, { "cve": "CVE-2011-3560", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745379" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3560" }, { "category": "external", "summary": "RHBZ#745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)" }, { "cve": "CVE-2011-3561", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747208" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3561" }, { "category": "external", "summary": "RHBZ#747208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-10-19T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1384" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.29-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.29-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" } ] }
rhsa-2012_0034
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The IBM Java SE version 6 release includes the IBM Java 6 Runtime\nEnvironment and the IBM Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 6 Runtime\nEnvironment and the IBM Java 6 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3516,\nCVE-2011-3521, CVE-2011-3544, CVE-2011-3545, CVE-2011-3546, CVE-2011-3547,\nCVE-2011-3548, CVE-2011-3549, CVE-2011-3550, CVE-2011-3551, CVE-2011-3552,\nCVE-2011-3553, CVE-2011-3554, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560,\nCVE-2011-3561)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM Java 6 SR10 release. All running instances\nof IBM Java must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0034", "url": "https://access.redhat.com/errata/RHSA-2012:0034" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "747200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200" }, { "category": "external", "summary": "747203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203" }, { "category": "external", "summary": "747205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205" }, { "category": "external", "summary": "747208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0034.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-ibm security update", "tracking": { "current_release_date": "2024-11-14T11:30:15+00:00", "generator": { "date": "2024-11-14T11:30:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0034", "initial_release_date": "2012-01-18T19:22:00+00:00", "revision_history": [ { "date": "2012-01-18T19:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-01-18T19:24:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:30:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "product_id": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.0-1jpp.2.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3389", "discovery_date": "2011-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "737506" } ], "notes": [ { "category": "description", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3389" }, { "category": "external", "summary": "RHBZ#737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389" } ], "release_date": "2011-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)" }, { "cve": "CVE-2011-3516", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747203" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3516" }, { "category": "external", "summary": "RHBZ#747203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3521", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745442" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3521" }, { "category": "external", "summary": "RHBZ#745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3521" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)" }, { "cve": "CVE-2011-3544", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745399" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3544" }, { "category": "external", "summary": "RHBZ#745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3544" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)" }, { "cve": "CVE-2011-3545", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747191" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3545" }, { "category": "external", "summary": "RHBZ#747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3545" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)" }, { "cve": "CVE-2011-3546", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747205" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3546" }, { "category": "external", "summary": "RHBZ#747205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3547", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3547" }, { "category": "external", "summary": "RHBZ#745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)" }, { "cve": "CVE-2011-3548", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745473" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3548" }, { "category": "external", "summary": "RHBZ#745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)" }, { "cve": "CVE-2011-3549", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747198" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3549" }, { "category": "external", "summary": "RHBZ#747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)" }, { "cve": "CVE-2011-3550", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747200" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3550" }, { "category": "external", "summary": "RHBZ#747200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)" }, { "cve": "CVE-2011-3551", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745391" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3551" }, { "category": "external", "summary": "RHBZ#745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)" }, { "cve": "CVE-2011-3552", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745397" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3552" }, { "category": "external", "summary": "RHBZ#745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3552" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)" }, { "cve": "CVE-2011-3553", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745476" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3553" }, { "category": "external", "summary": "RHBZ#745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3553" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)" }, { "cve": "CVE-2011-3554", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745447" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3554" }, { "category": "external", "summary": "RHBZ#745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)" }, { "cve": "CVE-2011-3556", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745459" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3556" }, { "category": "external", "summary": "RHBZ#745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)" }, { "cve": "CVE-2011-3557", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745464" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3557" }, { "category": "external", "summary": "RHBZ#745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)" }, { "cve": "CVE-2011-3560", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745379" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3560" }, { "category": "external", "summary": "RHBZ#745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)" }, { "cve": "CVE-2011-3561", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747208" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3561" }, { "category": "external", "summary": "RHBZ#747208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-18T19:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0034" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.10.0-1jpp.2.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.10.0-1jpp.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" } ] }
rhsa-2012_0006
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise\nLinux 5 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The IBM Java SE version 1.4.2 release includes the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3545,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560)\n\nAll users of java-1.4.2-ibm are advised to upgrade to these updated\npackages, which contain the IBM Java 1.4.2 SR13-FP11 release. All running\ninstances of IBM Java must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0006", "url": "https://access.redhat.com/errata/RHSA-2012:0006" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0006.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-ibm security update", "tracking": { "current_release_date": "2024-11-14T11:30:04+00:00", "generator": { "date": "2024-11-14T11:30:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0006", "initial_release_date": "2012-01-09T20:03:00+00:00", "revision_history": [ { "date": "2012-01-09T20:03:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-01-09T20:07:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:30:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.11-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.11-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.11-1jpp.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.11-1jpp.1.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.11-1jpp.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.11-1jpp.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.11-1jpp.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.11-1jpp.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3389", "discovery_date": "2011-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "737506" } ], "notes": [ { "category": "description", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3389" }, { "category": "external", "summary": "RHBZ#737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389" } ], "release_date": "2011-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-09T20:03:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0006" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)" }, { "cve": "CVE-2011-3545", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747191" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3545" }, { "category": "external", "summary": "RHBZ#747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3545" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-09T20:03:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0006" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)" }, { "cve": "CVE-2011-3547", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3547" }, { "category": "external", "summary": "RHBZ#745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-09T20:03:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0006" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)" }, { "cve": "CVE-2011-3548", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745473" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3548" }, { "category": "external", "summary": "RHBZ#745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-09T20:03:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0006" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)" }, { "cve": "CVE-2011-3549", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747198" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3549" }, { "category": "external", "summary": "RHBZ#747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-09T20:03:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0006" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)" }, { "cve": "CVE-2011-3552", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745397" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3552" }, { "category": "external", "summary": "RHBZ#745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3552" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-09T20:03:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0006" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)" }, { "cve": "CVE-2011-3556", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745459" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3556" }, { "category": "external", "summary": "RHBZ#745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-09T20:03:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0006" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)" }, { "cve": "CVE-2011-3557", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745464" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3557" }, { "category": "external", "summary": "RHBZ#745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-09T20:03:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0006" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)" }, { "cve": "CVE-2011-3560", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745379" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3560" }, { "category": "external", "summary": "RHBZ#745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-01-09T20:03:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0006" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.11-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.11-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)" } ] }
rhsa-2013_1455
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.4.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.4. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0865,\nCVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873,\nCVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545,\nCVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550,\nCVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560, CVE-2011-3561, CVE-2011-3563, CVE-2011-5035,\nCVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507,\nCVE-2012-0547, CVE-2012-0551, CVE-2012-1531, CVE-2012-1532, CVE-2012-1533,\nCVE-2012-1541, CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717,\nCVE-2012-1718, CVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1725,\nCVE-2012-3143, CVE-2012-3159, CVE-2012-3213, CVE-2012-3216, CVE-2012-3342,\nCVE-2012-4820, CVE-2012-4822, CVE-2012-4823, CVE-2012-5068, CVE-2012-5069,\nCVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5079,\nCVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5089, CVE-2013-0169,\nCVE-2013-0351, CVE-2013-0401, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,\nCVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428,\nCVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438,\nCVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445,\nCVE-2013-0446, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476,\nCVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486, CVE-2013-1487,\nCVE-2013-1491, CVE-2013-1493, CVE-2013-1500, CVE-2013-1537, CVE-2013-1540,\nCVE-2013-1557, CVE-2013-1563, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383,\nCVE-2013-2384, CVE-2013-2394, CVE-2013-2407, CVE-2013-2412, CVE-2013-2417,\nCVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424,\nCVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435,\nCVE-2013-2437, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444,\nCVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451,\nCVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456,\nCVE-2013-2457, CVE-2013-2459, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465,\nCVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471,\nCVE-2013-2472, CVE-2013-2473, CVE-2013-3743)\n\nUsers of Red Hat Network Satellite Server 5.4 are advised to upgrade to\nthese updated packages, which contain the IBM Java SE 6 SR14 release. For\nthis update to take effect, Red Hat Network Satellite Server must be\nrestarted (\"/usr/sbin/rhn-satellite restart\"), as well as all running\ninstances of IBM Java.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1455", "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "706106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106" }, { "category": "external", "summary": "706139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139" }, { "category": "external", "summary": "706153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153" }, { "category": "external", "summary": "706234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234" }, { "category": "external", "summary": "706241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241" }, { "category": "external", "summary": "706248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248" }, { "category": "external", "summary": "711675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675" }, { "category": "external", "summary": "711676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676" }, { "category": "external", "summary": "711677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677" }, { "category": "external", "summary": "737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "747200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200" }, { "category": "external", "summary": "747203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203" }, { "category": "external", "summary": "747205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205" }, { "category": "external", "summary": "747208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208" }, { "category": "external", "summary": "788606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788606" }, { "category": "external", "summary": "788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "external", "summary": "790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "790724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724" }, { "category": "external", "summary": "829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "external", "summary": "853097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097" }, { "category": "external", "summary": "853228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228" }, { "category": "external", "summary": "859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "865346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346" }, { "category": "external", "summary": "865348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348" }, { "category": "external", "summary": "865357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357" }, { "category": "external", "summary": "865363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363" }, { "category": "external", "summary": "865365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365" }, { "category": "external", "summary": "865370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370" }, { "category": "external", "summary": "865511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511" }, { "category": "external", "summary": "865514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514" }, { "category": "external", "summary": "865519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519" }, { "category": "external", "summary": "865531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531" }, { "category": "external", "summary": "865568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568" }, { "category": "external", "summary": "867185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185" }, { "category": "external", "summary": "867186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186" }, { "category": "external", "summary": "867187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187" }, { "category": "external", "summary": "867189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189" }, { "category": "external", "summary": "867190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190" }, { "category": "external", "summary": "867193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193" }, { "category": "external", "summary": "876386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386" }, { "category": "external", "summary": "876388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388" }, { "category": "external", "summary": "876389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389" }, { "category": "external", "summary": "906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "907589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" }, { "category": "external", "summary": "913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "external", "summary": "920245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245" }, { "category": "external", "summary": "920248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248" }, { "category": "external", "summary": "952387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387" }, { "category": "external", "summary": "952509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509" }, { "category": "external", "summary": "952521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521" }, { "category": "external", "summary": "952524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524" }, { "category": "external", "summary": "952638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638" }, { "category": "external", "summary": "952642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642" }, { "category": "external", "summary": "952648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648" }, { "category": "external", "summary": "952656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656" }, { "category": "external", "summary": "952657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657" }, { "category": "external", "summary": "952708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708" }, { "category": "external", "summary": "952709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709" }, { "category": "external", "summary": "952711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711" }, { "category": "external", "summary": "953166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166" }, { "category": "external", "summary": "953172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172" }, { "category": "external", "summary": "953265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265" }, { "category": "external", "summary": "953267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267" }, { "category": "external", "summary": "953269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269" }, { "category": "external", "summary": "953270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270" }, { "category": "external", "summary": "953273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273" }, { "category": "external", "summary": "953275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275" }, { "category": "external", "summary": "973474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474" }, { "category": "external", "summary": "975099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099" }, { "category": "external", "summary": "975102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102" }, { "category": "external", "summary": "975107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107" }, { "category": "external", "summary": "975110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110" }, { "category": "external", "summary": "975115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115" }, { "category": "external", "summary": "975118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118" }, { "category": "external", "summary": "975120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120" }, { "category": "external", "summary": "975121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121" }, { "category": "external", "summary": "975125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125" }, { "category": "external", "summary": "975127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127" }, { "category": "external", "summary": "975129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129" }, { "category": "external", "summary": "975131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131" }, { "category": "external", "summary": "975132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132" }, { "category": "external", "summary": "975133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133" }, { "category": "external", "summary": "975134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134" }, { "category": "external", "summary": "975137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137" }, { "category": "external", "summary": "975138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138" }, { "category": "external", "summary": "975139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139" }, { "category": "external", "summary": "975140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140" }, { "category": "external", "summary": "975141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141" }, { "category": "external", "summary": "975142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142" }, { "category": "external", "summary": "975144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144" }, { "category": "external", "summary": "975146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146" }, { "category": "external", "summary": "975148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148" }, { "category": "external", "summary": "975757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757" }, { "category": "external", "summary": "975761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761" }, { "category": "external", "summary": "975764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764" }, { "category": "external", "summary": "975767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767" }, { "category": "external", "summary": "975770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770" }, { "category": "external", "summary": "975773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1455.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update", "tracking": { "current_release_date": "2024-12-08T10:38:36+00:00", "generator": { "date": "2024-12-08T10:38:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2013:1455", "initial_release_date": "2013-10-23T16:26:00+00:00", "revision_history": [ { "date": "2013-10-23T16:26:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-10-23T16:30:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-08T10:38:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el5" } } }, { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "relates_to_product_reference": "6Server-Satellite" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-0802", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711677" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0802" }, { "category": "external", "summary": "RHBZ#711677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0802", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)" }, { "cve": "CVE-2011-0814", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711677" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0802.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0814" }, { "category": "external", "summary": "RHBZ#711677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0814", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)" }, { "cve": "CVE-2011-0862", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706139" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0862" }, { "category": "external", "summary": "RHBZ#706139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0862", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0862" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)" }, { "cve": "CVE-2011-0863", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711676" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0863" }, { "category": "external", "summary": "RHBZ#711676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0863", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0863" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)" }, { "cve": "CVE-2011-0865", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706106" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0865" }, { "category": "external", "summary": "RHBZ#706106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0865", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0865" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)" }, { "cve": "CVE-2011-0867", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706153" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: NetworkInterface information leak (Networking, 7013969)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0867" }, { "category": "external", "summary": "RHBZ#706153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0867", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: NetworkInterface information leak (Networking, 7013969)" }, { "cve": "CVE-2011-0868", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706241" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0868" }, { "category": "external", "summary": "RHBZ#706241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0868", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0868" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)" }, { "cve": "CVE-2011-0869", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706234" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 26 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to SAAJ.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0869" }, { "category": "external", "summary": "RHBZ#706234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0869", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869" } ], "release_date": "2011-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)" }, { "cve": "CVE-2011-0871", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706248" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0871" }, { "category": "external", "summary": "RHBZ#706248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0871", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)" }, { "cve": "CVE-2011-0873", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711675" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, and 5.0 Update 29 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u26 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0873" }, { "category": "external", "summary": "RHBZ#711675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0873", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0873" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u26 (2D)" }, { "cve": "CVE-2011-3389", "discovery_date": "2011-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "737506" } ], "notes": [ { "category": "description", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3389" }, { "category": "external", "summary": "RHBZ#737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389" } ], "release_date": "2011-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)" }, { "cve": "CVE-2011-3516", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747203" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3516" }, { "category": "external", "summary": "RHBZ#747203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3521", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745442" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3521" }, { "category": "external", "summary": "RHBZ#745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3521" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)" }, { "cve": "CVE-2011-3544", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745399" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3544" }, { "category": "external", "summary": "RHBZ#745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3544" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)" }, { "cve": "CVE-2011-3545", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747191" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3545" }, { "category": "external", "summary": "RHBZ#747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3545" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)" }, { "cve": "CVE-2011-3546", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747205" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3546" }, { "category": "external", "summary": "RHBZ#747205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3547", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3547" }, { "category": "external", "summary": "RHBZ#745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)" }, { "cve": "CVE-2011-3548", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745473" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3548" }, { "category": "external", "summary": "RHBZ#745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)" }, { "cve": "CVE-2011-3549", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747198" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3549" }, { "category": "external", "summary": "RHBZ#747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)" }, { "cve": "CVE-2011-3550", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747200" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3550" }, { "category": "external", "summary": "RHBZ#747200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)" }, { "cve": "CVE-2011-3551", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745391" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3551" }, { "category": "external", "summary": "RHBZ#745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)" }, { "cve": "CVE-2011-3552", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745397" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3552" }, { "category": "external", "summary": "RHBZ#745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3552" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)" }, { "cve": "CVE-2011-3553", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745476" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3553" }, { "category": "external", "summary": "RHBZ#745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3553" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)" }, { "cve": "CVE-2011-3554", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745447" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3554" }, { "category": "external", "summary": "RHBZ#745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)" }, { "cve": "CVE-2011-3556", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745459" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3556" }, { "category": "external", "summary": "RHBZ#745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)" }, { "cve": "CVE-2011-3557", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745464" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3557" }, { "category": "external", "summary": "RHBZ#745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)" }, { "cve": "CVE-2011-3560", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745379" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3560" }, { "category": "external", "summary": "RHBZ#745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)" }, { "cve": "CVE-2011-3561", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747208" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3561" }, { "category": "external", "summary": "RHBZ#747208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3563", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3563" }, { "category": "external", "summary": "RHBZ#789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)" }, { "cve": "CVE-2011-5035", "discovery_date": "2011-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771283" } ], "notes": [ { "category": "description", "text": "Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.", "title": "Vulnerability description" }, { "category": "summary", "text": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. This issue affects the GlassFish Web Container component. This\ncomponent is not shipped with any Red Hat products. JBoss Web and Tomcat\nprovide the web container used in all JBoss products.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5035" }, { "category": "external", "summary": "RHBZ#771283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5035", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5035" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035" } ], "release_date": "2011-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)" }, { "cve": "CVE-2012-0497", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789301" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0497" }, { "category": "external", "summary": "RHBZ#789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0497", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0497" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)" }, { "cve": "CVE-2012-0498", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790720" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0498" }, { "category": "external", "summary": "RHBZ#790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0499", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790722" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0499" }, { "category": "external", "summary": "RHBZ#790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0500", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790724" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0500" }, { "category": "external", "summary": "RHBZ#790724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0500", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)" }, { "cve": "CVE-2012-0501", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788624" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0501" }, { "category": "external", "summary": "RHBZ#788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)" }, { "cve": "CVE-2012-0502", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789297" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0502" }, { "category": "external", "summary": "RHBZ#789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)" }, { "cve": "CVE-2012-0503", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788976" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0503" }, { "category": "external", "summary": "RHBZ#788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)" }, { "cve": "CVE-2012-0505", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0505" }, { "category": "external", "summary": "RHBZ#789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)" }, { "cve": "CVE-2012-0506", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0506" }, { "category": "external", "summary": "RHBZ#789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)" }, { "cve": "CVE-2012-0507", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0507" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0507" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" }, { "cve": "CVE-2012-0547", "discovery_date": "2012-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "853228" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and \"a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited.\" NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"toolkit internals references.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AWT hardening fixes (AWT, 7163201)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0547" }, { "category": "external", "summary": "RHBZ#853228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0547", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547" } ], "release_date": "2012-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: AWT hardening fixes (AWT, 7163201)" }, { "cve": "CVE-2012-0551", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831355" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0551" }, { "category": "external", "summary": "RHBZ#831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0551", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1531", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867185" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1531" }, { "category": "external", "summary": "RHBZ#867185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1531", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (2D)" }, { "cve": "CVE-2012-1532", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867186" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier and 6 Update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1532" }, { "category": "external", "summary": "RHBZ#867186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1532", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-1533", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867187" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-3159.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1533" }, { "category": "external", "summary": "RHBZ#867187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1533", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1533" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-1541", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906914" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1541" }, { "category": "external", "summary": "RHBZ#906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-1682", "discovery_date": "2012-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "853097" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"XMLDecoder security issue via ClassFinder.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1682" }, { "category": "external", "summary": "RHBZ#853097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1682", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html" } ], "release_date": "2012-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)" }, { "cve": "CVE-2012-1713", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829361" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1713" }, { "category": "external", "summary": "RHBZ#829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)" }, { "cve": "CVE-2012-1716", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829360" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1716" }, { "category": "external", "summary": "RHBZ#829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)" }, { "cve": "CVE-2012-1717", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829358" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1717" }, { "category": "external", "summary": "RHBZ#829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)" }, { "cve": "CVE-2012-1718", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829372" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1718" }, { "category": "external", "summary": "RHBZ#829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)" }, { "cve": "CVE-2012-1719", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829371" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1719" }, { "category": "external", "summary": "RHBZ#829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)" }, { "cve": "CVE-2012-1721", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831353" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1721" }, { "category": "external", "summary": "RHBZ#831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1721", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1722", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831354" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1721.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1722" }, { "category": "external", "summary": "RHBZ#831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1722", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1722" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1725", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829376" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1725" }, { "category": "external", "summary": "RHBZ#829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)" }, { "cve": "CVE-2012-3143", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867189" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-5089.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3143" }, { "category": "external", "summary": "RHBZ#867189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3143", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (JMX)" }, { "cve": "CVE-2012-3159", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867190" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3159" }, { "category": "external", "summary": "RHBZ#867190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3159", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-3213", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907223" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3213" }, { "category": "external", "summary": "RHBZ#907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)" }, { "cve": "CVE-2012-3216", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3216" }, { "category": "external", "summary": "RHBZ#865346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3216", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)" }, { "cve": "CVE-2012-3342", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906917" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3342" }, { "category": "external", "summary": "RHBZ#906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-4820", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876386" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, when running under a security manager, allows remote attackers to gain privileges by modifying or removing the security manager via vectors related to \"insecure use of the java.lang.reflect.Method invoke() method.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.reflect.Method invoke() code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4820" }, { "category": "external", "summary": "RHBZ#876386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4820", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78764", "url": "http://xforce.iss.net/xforce/xfdb/78764" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.reflect.Method invoke() code execution" }, { "cve": "CVE-2012-4822", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876388" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allow remote attackers to execute arbitrary code via vectors related to \"insecure use [of] multiple methods in the java.lang.class class.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.class code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4822" }, { "category": "external", "summary": "RHBZ#876388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4822", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4822" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78766", "url": "http://xforce.iss.net/xforce/xfdb/78766" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.class code execution" }, { "cve": "CVE-2012-4823", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876389" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allows remote attackers to execute arbitrary code via vectors related to \"insecure use of the java.lang.ClassLoder defineClass() method.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.ClassLoder defineClass() code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4823" }, { "category": "external", "summary": "RHBZ#876389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4823", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78767", "url": "http://xforce.iss.net/xforce/xfdb/78767" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.ClassLoder defineClass() code execution" }, { "cve": "CVE-2012-5068", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865348" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5068" }, { "category": "external", "summary": "RHBZ#865348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5068", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)" }, { "cve": "CVE-2012-5069", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865531" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Executors state handling issues (Concurrency, 7189103)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5069" }, { "category": "external", "summary": "RHBZ#865531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5069", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5069" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Executors state handling issues (Concurrency, 7189103)" }, { "cve": "CVE-2012-5071", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865519" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5071" }, { "category": "external", "summary": "RHBZ#865519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5071", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)" }, { "cve": "CVE-2012-5072", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865365" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5072" }, { "category": "external", "summary": "RHBZ#865365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5072", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)" }, { "cve": "CVE-2012-5073", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865357" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: LogManager security bypass (Libraries, 7169884)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5073" }, { "category": "external", "summary": "RHBZ#865357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5073", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: LogManager security bypass (Libraries, 7169884)" }, { "cve": "CVE-2012-5075", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865363" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5075" }, { "category": "external", "summary": "RHBZ#865363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5075", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)" }, { "cve": "CVE-2012-5079", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865568" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5079" }, { "category": "external", "summary": "RHBZ#865568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5079", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)" }, { "cve": "CVE-2012-5081", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865370" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JSSE denial of service (JSSE, 7186286)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5081" }, { "category": "external", "summary": "RHBZ#865370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5081", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JSSE denial of service (JSSE, 7186286)" }, { "cve": "CVE-2012-5083", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867193" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5083" }, { "category": "external", "summary": "RHBZ#867193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5083", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (2D)" }, { "cve": "CVE-2012-5084", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865511" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5084" }, { "category": "external", "summary": "RHBZ#865511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5084", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5084" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)" }, { "cve": "CVE-2012-5089", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865514" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5089" }, { "category": "external", "summary": "RHBZ#865514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5089", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5089" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)" }, { "cve": "CVE-2013-0169", "discovery_date": "2013-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907589" } ], "notes": [ { "category": "description", "text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: CBC padding timing attack (lucky-13)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0169" }, { "category": "external", "summary": "RHBZ#907589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169" }, { "category": "external", "summary": "http://www.isg.rhul.ac.uk/tls/", "url": "http://www.isg.rhul.ac.uk/tls/" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20130205.txt", "url": "http://www.openssl.org/news/secadv_20130205.txt" }, { "category": "external", "summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released", "url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released" } ], "release_date": "2013-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "category": "workaround", "details": "On OpenShift Container Platform 3.11 it\u0027s possible to edit the list of cipher suites offered by the router when performing \u0027edge\u0027, or \u0027re-encrypt\u0027 TLS modes. Please follow the documentation [1], and [2] to remove the vulnerable CBC ciphers use the modern, or intermediate cipher suites outlined by Mozilla instead [3]. In \u0027passthrough\u0027 mode TLS termination occurs in the application so that is another way to mitigate the vulnerability.\n[1] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#obtaining-router-configuration-template\n[2] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#using-configmap-replace-template\n[3] https://wiki.mozilla.org/Security/Server_Side_TLS", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: CBC padding timing attack (lucky-13)" }, { "cve": "CVE-2013-0351", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906923" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0351" }, { "category": "external", "summary": "RHBZ#906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0401", "discovery_date": "2013-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "920245" } ], "notes": [ { "category": "description", "text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0401" }, { "category": "external", "summary": "RHBZ#920245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)" }, { "cve": "CVE-2013-0409", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907226" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0409" }, { "category": "external", "summary": "RHBZ#907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)" }, { "cve": "CVE-2013-0419", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906918" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0419" }, { "category": "external", "summary": "RHBZ#906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0423", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906921" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0423" }, { "category": "external", "summary": "RHBZ#906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0424", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906813" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0424" }, { "category": "external", "summary": "RHBZ#906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)" }, { "cve": "CVE-2013-0425", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907344" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0425" }, { "category": "external", "summary": "RHBZ#907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)" }, { "cve": "CVE-2013-0426", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0426" }, { "category": "external", "summary": "RHBZ#907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)" }, { "cve": "CVE-2013-0427", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907455" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0427" }, { "category": "external", "summary": "RHBZ#907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)" }, { "cve": "CVE-2013-0428", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907207" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0428" }, { "category": "external", "summary": "RHBZ#907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)" }, { "cve": "CVE-2013-0432", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907219" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0432" }, { "category": "external", "summary": "RHBZ#907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)" }, { "cve": "CVE-2013-0433", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907456" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0433" }, { "category": "external", "summary": "RHBZ#907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)" }, { "cve": "CVE-2013-0434", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907453" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0434" }, { "category": "external", "summary": "RHBZ#907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)" }, { "cve": "CVE-2013-0435", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906892" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0435" }, { "category": "external", "summary": "RHBZ#906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)" }, { "cve": "CVE-2013-0438", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906935" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0438" }, { "category": "external", "summary": "RHBZ#906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0440", "discovery_date": "2012-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "859140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0440" }, { "category": "external", "summary": "RHBZ#859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)" }, { "cve": "CVE-2013-0441", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907458" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing serialization restriction (CORBA, 7201066)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0441" }, { "category": "external", "summary": "RHBZ#907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0441" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing serialization restriction (CORBA, 7201066)" }, { "cve": "CVE-2013-0442", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906899" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0442" }, { "category": "external", "summary": "RHBZ#906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)" }, { "cve": "CVE-2013-0443", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907340" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0443" }, { "category": "external", "summary": "RHBZ#907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)" }, { "cve": "CVE-2013-0445", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906900" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0445" }, { "category": "external", "summary": "RHBZ#906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)" }, { "cve": "CVE-2013-0446", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906916" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0446" }, { "category": "external", "summary": "RHBZ#906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0450", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906911" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0450" }, { "category": "external", "summary": "RHBZ#906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)" }, { "cve": "CVE-2013-0809", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917550" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0809" }, { "category": "external", "summary": "RHBZ#917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0809", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)" }, { "cve": "CVE-2013-1473", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906933" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1473" }, { "category": "external", "summary": "RHBZ#906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-1476", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907457" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1476" }, { "category": "external", "summary": "RHBZ#907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)" }, { "cve": "CVE-2013-1478", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906894" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1478" }, { "category": "external", "summary": "RHBZ#906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)" }, { "cve": "CVE-2013-1480", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1480" }, { "category": "external", "summary": "RHBZ#906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)" }, { "cve": "CVE-2013-1481", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907224" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1481" }, { "category": "external", "summary": "RHBZ#907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1481", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1481" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 (Sound)" }, { "cve": "CVE-2013-1486", "discovery_date": "2013-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913014" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1486" }, { "category": "external", "summary": "RHBZ#913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1486", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1486" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)" }, { "cve": "CVE-2013-1487", "discovery_date": "2013-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913030" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1487" }, { "category": "external", "summary": "RHBZ#913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1487", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1487" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)" }, { "cve": "CVE-2013-1491", "discovery_date": "2013-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "920248" } ], "notes": [ { "category": "description", "text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to execute arbitrary code via vectors related to 2D, as demonstrated by Joshua Drake during a Pwn2Own competition at CanSecWest 2013.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1491" }, { "category": "external", "summary": "RHBZ#920248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1491", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491" } ], "release_date": "2013-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)" }, { "cve": "CVE-2013-1493", "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917553" } ], "notes": [ { "category": "description", "text": "The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1493" }, { "category": "external", "summary": "RHBZ#917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1493", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1493" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)" }, { "acknowledgments": [ { "names": [ "Tim Brown" ] } ], "cve": "CVE-2013-1500", "discovery_date": "2013-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975148" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Insecure shared memory permissions (2D, 8001034)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1500" }, { "category": "external", "summary": "RHBZ#975148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1500", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: Insecure shared memory permissions (2D, 8001034)" }, { "cve": "CVE-2013-1537", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform \"dynamic class downloading\" and execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: remote code loading enabled by default (RMI, 8001040)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1537" }, { "category": "external", "summary": "RHBZ#952387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1537", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: remote code loading enabled by default (RMI, 8001040)" }, { "cve": "CVE-2013-1540", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953166" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2433.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1540" }, { "category": "external", "summary": "RHBZ#953166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1540", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-1557", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952648" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"missing security restrictions\" in the LogStream.setDefaultStream method.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1557" }, { "category": "external", "summary": "RHBZ#952648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1557", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)" }, { "cve": "CVE-2013-1563", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953172" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1563" }, { "category": "external", "summary": "RHBZ#953172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1563", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)" }, { "cve": "CVE-2013-1569", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952711" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"checking of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1569" }, { "category": "external", "summary": "RHBZ#952711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1569", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1569" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)" }, { "acknowledgments": [ { "names": [ "US-CERT" ] } ], "cve": "CVE-2013-1571", "discovery_date": "2013-06-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "973474" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1571" }, { "category": "external", "summary": "RHBZ#973474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1571", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571" }, { "category": "external", "summary": "http://www.kb.cert.org/vuls/id/225657", "url": "http://www.kb.cert.org/vuls/id/225657" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)" }, { "cve": "CVE-2013-2383", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952708" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"handling of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2383" }, { "category": "external", "summary": "RHBZ#952708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2383", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2383" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)" }, { "cve": "CVE-2013-2384", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952709" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font layout\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2384" }, { "category": "external", "summary": "RHBZ#952709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2384", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)" }, { "cve": "CVE-2013-2394", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953265" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2432 and CVE-2013-1491.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2394" }, { "category": "external", "summary": "RHBZ#953265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2394", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)" }, { "cve": "CVE-2013-2407", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975127" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"XML security and the class loader.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2407" }, { "category": "external", "summary": "RHBZ#975127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2407", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2407" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)" }, { "cve": "CVE-2013-2412", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975144" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JConsole SSL support (Serviceability, 8003703)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2412" }, { "category": "external", "summary": "RHBZ#975144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2412", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2412" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JConsole SSL support (Serviceability, 8003703)" }, { "cve": "CVE-2013-2417", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952657" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2417" }, { "category": "external", "summary": "RHBZ#952657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2417", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2417" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)" }, { "cve": "CVE-2013-2418", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953267" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2418" }, { "category": "external", "summary": "RHBZ#953267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2418", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2418" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2419", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952656" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font processing errors\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2419" }, { "category": "external", "summary": "RHBZ#952656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)" }, { "cve": "CVE-2013-2420", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952638" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient \"validation of images\" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image processing vulnerability (2D, 8007617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2420" }, { "category": "external", "summary": "RHBZ#952638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2420", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2420" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image processing vulnerability (2D, 8007617)" }, { "cve": "CVE-2013-2422", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952642" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2422" }, { "category": "external", "summary": "RHBZ#952642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)" }, { "cve": "CVE-2013-2424", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952509" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient class access checks\" when \"creating new instances\" using MBeanInstantiator.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2424" }, { "category": "external", "summary": "RHBZ#952509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)" }, { "cve": "CVE-2013-2429", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952521" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageWriter state corruption\" when using native code, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2429" }, { "category": "external", "summary": "RHBZ#952521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2429", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2429" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)" }, { "cve": "CVE-2013-2430", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952524" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageReader state corruption\" when using native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2430" }, { "category": "external", "summary": "RHBZ#952524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2430", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2430" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)" }, { "cve": "CVE-2013-2432", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953269" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2394 and CVE-2013-1491.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2432" }, { "category": "external", "summary": "RHBZ#953269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)" }, { "cve": "CVE-2013-2433", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953270" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-1540.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2433" }, { "category": "external", "summary": "RHBZ#953270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2435", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953273" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2435" }, { "category": "external", "summary": "RHBZ#953273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2437", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975773" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2437" }, { "category": "external", "summary": "RHBZ#975773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2437", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2440", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953275" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2435.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2440" }, { "category": "external", "summary": "RHBZ#953275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2442", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975770" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2466 and CVE-2013-2468.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2442" }, { "category": "external", "summary": "RHBZ#975770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2443", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975137" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect \"checking order\" within the AccessControlContext class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2443" }, { "category": "external", "summary": "RHBZ#975137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)" }, { "cve": "CVE-2013-2444", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975131" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not \"properly manage and restrict certain resources related to the processing of fonts,\" possibly involving temporary files.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Resource denial of service (AWT, 8001038)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2444" }, { "category": "external", "summary": "RHBZ#975131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2444", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Resource denial of service (AWT, 8001038)" }, { "cve": "CVE-2013-2446", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975132" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: output stream access restrictions (CORBA, 8000642)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2446" }, { "category": "external", "summary": "RHBZ#975132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: output stream access restrictions (CORBA, 8000642)" }, { "cve": "CVE-2013-2447", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket\u0027s local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Prevent revealing the local address (Networking, 8001318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2447" }, { "category": "external", "summary": "RHBZ#975140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2447", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Prevent revealing the local address (Networking, 8001318)" }, { "cve": "CVE-2013-2448", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975125" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient \"access restrictions\" and \"robustness of sound classes.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Better access restrictions (Sound, 8006328)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2448" }, { "category": "external", "summary": "RHBZ#975125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2448", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Better access restrictions (Sound, 8006328)" }, { "cve": "CVE-2013-2450", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975141" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2450" }, { "category": "external", "summary": "RHBZ#975141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)" }, { "cve": "CVE-2013-2451", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975146" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: exclusive port binding (Networking, 7170730)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2451" }, { "category": "external", "summary": "RHBZ#975146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2451", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2451" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: exclusive port binding (Networking, 7170730)" }, { "cve": "CVE-2013-2452", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975138" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"network address handling in virtual machine identifiers\" and the lack of \"unique and unpredictable IDs\" in the java.rmi.dgc.VMID class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Unique VMIDs (Libraries, 8001033)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2452" }, { "category": "external", "summary": "RHBZ#975138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2452", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2452" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Unique VMIDs (Libraries, 8001033)" }, { "cve": "CVE-2013-2453", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975134" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for \"package access\" by the MBeanServer Introspector.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2453" }, { "category": "external", "summary": "RHBZ#975134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2453", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2453" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)" }, { "cve": "CVE-2013-2454", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975129" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2454" }, { "category": "external", "summary": "RHBZ#975129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2454", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2454" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)" }, { "cve": "CVE-2013-2455", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975139" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: getEnclosing* checks (Libraries, 8007812)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2455" }, { "category": "external", "summary": "RHBZ#975139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2455", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2455" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: getEnclosing* checks (Libraries, 8007812)" }, { "cve": "CVE-2013-2456", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975142" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2456" }, { "category": "external", "summary": "RHBZ#975142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2456", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2456" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)" }, { "cve": "CVE-2013-2457", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975133" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of \"certain class checks\" that allows remote attackers to bypass intended class restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Proper class checking (JMX, 8008120)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2457" }, { "category": "external", "summary": "RHBZ#975133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2457", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2457" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Proper class checking (JMX, 8008120)" }, { "cve": "CVE-2013-2459", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975121" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"integer overflow checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2459" }, { "category": "external", "summary": "RHBZ#975121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2459", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)" }, { "cve": "CVE-2013-2463", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975115" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image attribute verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image attribute verification (2D, 8012438)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2463" }, { "category": "external", "summary": "RHBZ#975115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2463", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image attribute verification (2D, 8012438)" }, { "cve": "CVE-2013-2464", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975757" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, and CVE-2013-2473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2464" }, { "category": "external", "summary": "RHBZ#975757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2464", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (2D)" }, { "cve": "CVE-2013-2465", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975118" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image channel verification (2D, 8012597)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2465" }, { "category": "external", "summary": "RHBZ#975118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2465", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image channel verification (2D, 8012597)" }, { "cve": "CVE-2013-2466", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975764" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2468.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2466" }, { "category": "external", "summary": "RHBZ#975764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2466", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2468", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975761" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2466.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2468" }, { "category": "external", "summary": "RHBZ#975761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2468", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2469", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975120" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image layout verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image layout verification (2D, 8012601)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2469" }, { "category": "external", "summary": "RHBZ#975120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2469", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image layout verification (2D, 8012601)" }, { "cve": "CVE-2013-2470", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975099" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"ImagingLib byte lookup processing.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2470" }, { "category": "external", "summary": "RHBZ#975099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2470", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)" }, { "cve": "CVE-2013-2471", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975102" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect IntegerComponentRaster size checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2471" }, { "category": "external", "summary": "RHBZ#975102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2471", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)" }, { "cve": "CVE-2013-2472", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975107" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ShortBandedRaster size checks\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2472" }, { "category": "external", "summary": "RHBZ#975107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2472", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2472" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)" }, { "cve": "CVE-2013-2473", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975110" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ByteBandedRaster size checks\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2473" }, { "category": "external", "summary": "RHBZ#975110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)" }, { "cve": "CVE-2013-3743", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975767" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 45 and earlier and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-3743" }, { "category": "external", "summary": "RHBZ#975767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-3743", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)" } ] }
icsma-18-058-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Phillips", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access to sensitive information, perform man-in-the-middle attacks, create denial of service conditions, or execute arbitrary code.", "title": "Risk evaluation" }, { "category": "other", "text": "Healthcare and Public Health", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "United States", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Do not click web links or open attachments in unsolicited email messages.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSMA-18-058-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsma-18-058-02.json" }, { "category": "self", "summary": "ICSA Advisory ICSMA-18-058-02 - Web Version", "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-18-058-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Philips Intellispace Portal ISP Vulnerabilities", "tracking": { "current_release_date": "2018-02-27T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSMA-18-058-02", "initial_release_date": "2018-02-27T00:00:00.000000Z", "revision_history": [ { "date": "2018-02-27T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSMA-18-058-02 Philips Intellispace Portal ISP Vulnerabilities" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "IntelliSpace Portal 8.0.x: *", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "IntelliSpace Portal 8.0.x" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "IntelliSpace Portal 7.0.x: *", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "IntelliSpace Portal 7.0.x" } ], "category": "vendor", "name": "Phillips" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5474", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have an input validation vulnerability that could allow a remote attacker to execute arbitrary code or cause the application to crash.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5474" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0143", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0143" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0144", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0144" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0145", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0145" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0146", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0148.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0146" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0148", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0146.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0148" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0272", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0277, CVE-2017-0278, and CVE-2017-0279.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0272" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0277", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0278, and CVE-2017-0279.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0277" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0278", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0277, and CVE-2017-0279.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0278" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0279", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0277, and CVE-2017-0278.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0279" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0269", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0273 and CVE-2017-0280.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0269" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0273", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0269 and CVE-2017-0280", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0273" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0280", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0269 and CVE-2017-0273.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0280" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0147", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka \"Windows SMB Information Disclosure Vulnerability.\"", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0147" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0267", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0267" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0268", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0268" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0270", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0270" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0271", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0271" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0274", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0275, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0274" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0275", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0275" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0276", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, and CVE-2017-0275.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0276" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5472", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have an insecure windows permissions vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5472" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5468", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have a remote desktop access vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5468" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0199", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka \"Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API.\"", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0199" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2005-1794", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "Microsoft Terminal Server using Remote Desktop Protocol (RDP) 5.2 stores an RSA private key in mstlsapi.dll and uses it to sign a certificate, which allows remote attackers to spoof public keys of legitimate servers and conduct man-in-the-middle attacks.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1794" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5470", "cwe": { "id": "CWE-428", "name": "Unquoted Search Path or Element" }, "notes": [ { "category": "summary", "text": "An unquoted search path or element vulnerability has been identified, which may allow an authorized local user to execute arbitrary code and escalate their level of privileges.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5470" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5454", "cwe": { "id": "CWE-489", "name": "Active Debug Code" }, "notes": [ { "category": "summary", "text": "The ISP has a vulnerability where code debugging methods are enabled, which could allow an attacker to remotely execute arbitrary code during runtime.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5454" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5458", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have a remote desktop access vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5458" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5462", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an SSL incorrect hostname certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5462" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an untrusted SSL certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5464" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have a self-signed SSL certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5466" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2011-3389", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2004-2761", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2761" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2014-3566", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the \"POODLE\" issue.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2016-2183", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2183" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
ICSMA-18-058-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Phillips", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access to sensitive information, perform man-in-the-middle attacks, create denial of service conditions, or execute arbitrary code.", "title": "Risk evaluation" }, { "category": "other", "text": "Healthcare and Public Health", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "United States", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Do not click web links or open attachments in unsolicited email messages.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSMA-18-058-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsma-18-058-02.json" }, { "category": "self", "summary": "ICSA Advisory ICSMA-18-058-02 - Web Version", "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-18-058-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Philips Intellispace Portal ISP Vulnerabilities", "tracking": { "current_release_date": "2018-02-27T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSMA-18-058-02", "initial_release_date": "2018-02-27T00:00:00.000000Z", "revision_history": [ { "date": "2018-02-27T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSMA-18-058-02 Philips Intellispace Portal ISP Vulnerabilities" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "IntelliSpace Portal 8.0.x: *", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "IntelliSpace Portal 8.0.x" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "IntelliSpace Portal 7.0.x: *", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "IntelliSpace Portal 7.0.x" } ], "category": "vendor", "name": "Phillips" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5474", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have an input validation vulnerability that could allow a remote attacker to execute arbitrary code or cause the application to crash.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5474" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0143", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0143" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0144", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0144" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0145", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0145" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0146", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0148.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0146" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0148", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka \"Windows SMB Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0146.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0148" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0272", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0277, CVE-2017-0278, and CVE-2017-0279.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0272" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0277", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0278, and CVE-2017-0279.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0277" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0278", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0277, and CVE-2017-0279.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0278" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0279", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka \"Windows SMB Remote Code Execution Vulnerability\". This CVE ID is unique from CVE-2017-0272, CVE-2017-0277, and CVE-2017-0278.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0279" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0269", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0273 and CVE-2017-0280.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0269" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0273", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0269 and CVE-2017-0280", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0273" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0280", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka \"Windows SMB Denial of Service Vulnerability\". This CVE ID is unique from CVE-2017-0269 and CVE-2017-0273.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0280" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0147", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka \"Windows SMB Information Disclosure Vulnerability.\"", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0147" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0267", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0267" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0268", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0268" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0270", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0270" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0271", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0271" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0274", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0275, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0274" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0275", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, and CVE-2017-0276.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0275" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0276", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka \"Windows SMB Information Disclosure Vulnerability\". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, and CVE-2017-0275.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0276" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5472", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have an insecure windows permissions vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5472" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5468", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have a remote desktop access vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5468" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2017-0199", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka \"Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API.\"", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0199" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2005-1794", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "Microsoft Terminal Server using Remote Desktop Protocol (RDP) 5.2 stores an RSA private key in mstlsapi.dll and uses it to sign a certificate, which allows remote attackers to spoof public keys of legitimate servers and conduct man-in-the-middle attacks.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1794" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5470", "cwe": { "id": "CWE-428", "name": "Unquoted Search Path or Element" }, "notes": [ { "category": "summary", "text": "An unquoted search path or element vulnerability has been identified, which may allow an authorized local user to execute arbitrary code and escalate their level of privileges.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5470" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5454", "cwe": { "id": "CWE-489", "name": "Active Debug Code" }, "notes": [ { "category": "summary", "text": "The ISP has a vulnerability where code debugging methods are enabled, which could allow an attacker to remotely execute arbitrary code during runtime.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5454" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5458", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "Philips Intellispace Portal all versions 7.0.x and 8.0.x have a remote desktop access vulnerability that could allow an attacker to gain unauthorized access and in some cases escalate their level of privilege or execute arbitrary code", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5458" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5462", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an SSL incorrect hostname certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5462" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an untrusted SSL certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5464" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2018-5466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have a self-signed SSL certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5466" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2011-3389", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2004-2761", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2761" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2014-3566", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the \"POODLE\" issue.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2016-2183", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2183" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Philips\u0027 evaluation of Operating System security patches is ongoing, and after appropriate testing, the patches and mitigating controls are posted on Philips\u0027 InCenter. ISP users are recommended to obtain available mitigating controls by accessing their InCenter account at this location: http://incenter.medical.philips.com", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "http://incenter.medical.philips.com" }, { "category": "mitigation", "details": "Users with questions regarding their specific ISP installations are advised by Philips to contact their local Philips service support team or their regional service support.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Philips\u0027 contact information is available at the following location: https://www.usa.philips.com/healthcare/solutions/customer-service-solutions", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.usa.philips.com/healthcare/solutions/customer-service-solutions" }, { "category": "mitigation", "details": "Please see the Philips product security website for the latest security information for Philips products: https://www.philips.com/productsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.philips.com/productsecurity" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
ICSA-19-192-04
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Wendy Parrington" ], "organization": "United Utilities", "summary": "reporting these vulnerabilities to Siemens" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow access to sensitive information.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Food and Agriculture, Transportation Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nNCCIC also provides a section for control systems security recommended practices on the ICS webpage on us-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and \nsolutions, please contact the Siemens ProductCERT:\n\nhttps://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "High skill level is needed to exploit.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-192-04 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-192-04.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-192-04 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-192-04" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-496604: SSA-556833: TLS Vulnerabilities in SIMATIC RF6XXR - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/SSA-556833.txt" } ], "title": "Siemens SIMATIC RF6XXR", "tracking": { "current_release_date": "2019-07-11T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-192-04", "initial_release_date": "2019-07-11T00:00:00.000000Z", "revision_history": [ { "date": "2019-07-11T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-192-04 Siemens SIMATIC RF6XXR " } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V3.2.1", "product": { "name": "SIMATIC RF615R: All versions \u003c V3.2.1", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIMATIC RF615R" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V3.2.1", "product": { "name": "SIMATIC RF68XR: All versions \u003c V3.2.1", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SIMATIC RF68XR" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3389", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SSL protocol encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses e.g. the HTML5 WebSocket API, the Java URLConnection API, or the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "https://support.industry.siemens.com/cs/ww/en/view/109768501", "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Restrict network access to the device to the extent possible", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2016-6329", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "TLS, when used with a 64-bit block cipher, could allow remote attackers to obtain cleartext data by leveraging a birthday attack against a long-duration encrypted session, aka a \"Sweet32\" attack.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "https://support.industry.siemens.com/cs/ww/en/view/109768501", "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" } ], "remediations": [ { "category": "vendor_fix", "details": "Restrict network access to the device to the extent possible", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2013-0169", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "TLS and DTLS versions 1.1 and 1.2, as used in the affected product, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "https://support.industry.siemens.com/cs/ww/en/view/109768501", "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0169" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Restrict network access to the device to the extent possible", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
icsa-19-192-04
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Wendy Parrington" ], "organization": "United Utilities", "summary": "reporting these vulnerabilities to Siemens" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow access to sensitive information.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Food and Agriculture, Transportation Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nNCCIC also provides a section for control systems security recommended practices on the ICS webpage on us-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and \nsolutions, please contact the Siemens ProductCERT:\n\nhttps://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "High skill level is needed to exploit.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-192-04 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-192-04.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-192-04 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-192-04" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-496604: SSA-556833: TLS Vulnerabilities in SIMATIC RF6XXR - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/SSA-556833.txt" } ], "title": "Siemens SIMATIC RF6XXR", "tracking": { "current_release_date": "2019-07-11T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-192-04", "initial_release_date": "2019-07-11T00:00:00.000000Z", "revision_history": [ { "date": "2019-07-11T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-192-04 Siemens SIMATIC RF6XXR " } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V3.2.1", "product": { "name": "SIMATIC RF615R: All versions \u003c V3.2.1", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIMATIC RF615R" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V3.2.1", "product": { "name": "SIMATIC RF68XR: All versions \u003c V3.2.1", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "SIMATIC RF68XR" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3389", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The SSL protocol encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses e.g. the HTML5 WebSocket API, the Java URLConnection API, or the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "https://support.industry.siemens.com/cs/ww/en/view/109768501", "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Restrict network access to the device to the extent possible", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2016-6329", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "TLS, when used with a 64-bit block cipher, could allow remote attackers to obtain cleartext data by leveraging a birthday attack against a long-duration encrypted session, aka a \"Sweet32\" attack.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "https://support.industry.siemens.com/cs/ww/en/view/109768501", "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" } ], "remediations": [ { "category": "vendor_fix", "details": "Restrict network access to the device to the extent possible", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2013-0169", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "TLS and DTLS versions 1.1 and 1.2, as used in the affected product, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "https://support.industry.siemens.com/cs/ww/en/view/109768501", "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0169" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Restrict network access to the device to the extent possible", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "vendor_fix", "details": "Update to V3.2.1 - Download: https://support.industry.siemens.com/cs/ww/en/view/109768501 ", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109768501" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
ghsa-rhch-pcq2-7gp3
Vulnerability from github
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
{ "affected": [], "aliases": [ "CVE-2011-3389" ], "database_specific": { "cwe_ids": [ "CWE-20", "CWE-326" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-09-06T19:55:00Z", "severity": "MODERATE" }, "details": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "id": "GHSA-rhch-pcq2-7gp3", "modified": "2022-05-13T01:07:48Z", "published": "2022-05-13T01:07:48Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389" }, { "type": "WEB", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" }, { "type": "WEB", "url": "https://bugzilla.novell.com/show_bug.cgi?id=719047" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf" }, { "type": "WEB", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006" }, { "type": "WEB", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862" }, { "type": "WEB", "url": "https://hermes.opensuse.org/messages/13154861" }, { "type": "WEB", "url": "https://hermes.opensuse.org/messages/13155432" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752" }, { "type": "WEB", "url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications" }, { "type": "WEB", "url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx" }, { "type": "WEB", "url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx" }, { "type": "WEB", "url": "http://curl.haxx.se/docs/adv_20120124B.html" }, { "type": "WEB", "url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html" }, { "type": "WEB", "url": "http://ekoparty.org/2011/juliano-rizzo.php" }, { "type": "WEB", "url": "http://eprint.iacr.org/2004/111" }, { "type": "WEB", "url": "http://eprint.iacr.org/2006/136" }, { "type": "WEB", "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" }, { "type": "WEB", "url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635" }, { "type": "WEB", "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "type": "WEB", "url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue" }, { "type": "WEB", "url": "http://osvdb.org/74829" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/45791" }, { "type": "WEB", "url": "http://secunia.com/advisories/47998" }, { "type": "WEB", "url": "http://secunia.com/advisories/48256" }, { "type": "WEB", "url": "http://secunia.com/advisories/48692" }, { "type": "WEB", "url": "http://secunia.com/advisories/48915" }, { "type": "WEB", "url": "http://secunia.com/advisories/48948" }, { "type": "WEB", "url": "http://secunia.com/advisories/49198" }, { "type": "WEB", "url": "http://secunia.com/advisories/55322" }, { "type": "WEB", "url": "http://secunia.com/advisories/55350" }, { "type": "WEB", "url": "http://secunia.com/advisories/55351" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT4999" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5001" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5130" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5281" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5501" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT6150" }, { "type": "WEB", "url": "http://technet.microsoft.com/security/advisory/2588513" }, { "type": "WEB", "url": "http://vnhacker.blogspot.com/2011/09/beast.html" }, { "type": "WEB", "url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf" }, { "type": "WEB", "url": "http://www.debian.org/security/2012/dsa-2398" }, { "type": "WEB", "url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html" }, { "type": "WEB", "url": "http://www.ibm.com/developerworks/java/jdk/alerts" }, { "type": "WEB", "url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html" }, { "type": "WEB", "url": "http://www.insecure.cl/Beast-SSL.rar" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/864643" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058" }, { "type": "WEB", "url": "http://www.opera.com/docs/changelogs/mac/1151" }, { "type": "WEB", "url": "http://www.opera.com/docs/changelogs/mac/1160" }, { "type": "WEB", "url": "http://www.opera.com/docs/changelogs/unix/1151" }, { "type": "WEB", "url": "http://www.opera.com/docs/changelogs/unix/1160" }, { "type": "WEB", "url": "http://www.opera.com/docs/changelogs/windows/1151" }, { "type": "WEB", "url": "http://www.opera.com/docs/changelogs/windows/1160" }, { "type": "WEB", "url": "http://www.opera.com/support/kb/view/1004" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/49388" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/49778" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1029190" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1025997" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1026103" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1026704" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1263-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html" } ], "schema_version": "1.4.0", "severity": [] }
var-201109-0130
Vulnerability from variot
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack. SSL Protocol and TLS The protocol includes CBC There are vulnerabilities that are subject to selective plaintext attacks in mode. SSL Protocol and TLS Protocol is CBC Initialization vector when operating in mode (IV) There is a problem in the determination method, and there is a vulnerability that is subject to selective plaintext attacks. Attack methods using this vulnerability have been released.Encrypted communication is a man-in-the-middle attack (man-in-the-middle attack) If they are intercepted by you, their content may be decrypted. A vulnerability in the specification of the SSL 3.0 and TLS 1.0 protocols could allow an attacker to decrypt encrypted traffic. This will result in a false sense of security, and potentially result in the disclosure of sensitive information. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201111-02
http://security.gentoo.org/
Severity: Normal Title: Oracle JRE/JDK: Multiple vulnerabilities Date: November 05, 2011 Bugs: #340421, #354213, #370559, #387851 ID: 201111-02
Synopsis
Multiple vulnerabilities have been found in the Oracle JRE/JDK, allowing attackers to cause unspecified impact.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-java/sun-jre-bin < 1.6.0.29 >= 1.6.0.29 * 2 app-emulation/emul-linux-x86-java < 1.6.0.29 >= 1.6.0.29 * 3 dev-java/sun-jdk < 1.6.0.29 >= 1.6.0.29 * ------------------------------------------------------------------- NOTE: Packages marked with asterisks require manual intervention! ------------------------------------------------------------------- 3 affected packages -------------------------------------------------------------------
Description
Multiple vulnerabilities have been reported in the Oracle Java implementation. Please review the CVE identifiers referenced below and the associated Oracle Critical Patch Update Advisory for details.
Impact
A remote attacker could exploit these vulnerabilities to cause unspecified impact, possibly including remote execution of arbitrary code.
Workaround
There is no known workaround at this time.
Resolution
All Oracle JDK 1.6 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.6.0.29"
All Oracle JRE 1.6 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.6.0.29"
All users of the precompiled 32-bit Oracle JRE 1.6 should upgrade to the latest version:
# emerge --sync # emerge -a -1 -v ">=app-emulation/emul-linux-x86-java-1.6.0.29"
NOTE: As Oracle has revoked the DLJ license for its Java implementation, the packages can no longer be updated automatically. This limitation is not present on a non-fetch restricted implementation such as dev-java/icedtea-bin.
References
[ 1 ] CVE-2010-3541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541 [ 2 ] CVE-2010-3548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548 [ 3 ] CVE-2010-3549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549 [ 4 ] CVE-2010-3550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3550 [ 5 ] CVE-2010-3551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551 [ 6 ] CVE-2010-3552 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3552 [ 7 ] CVE-2010-3553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553 [ 8 ] CVE-2010-3554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554 [ 9 ] CVE-2010-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3555 [ 10 ] CVE-2010-3556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3556 [ 11 ] CVE-2010-3557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557 [ 12 ] CVE-2010-3558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3558 [ 13 ] CVE-2010-3559 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3559 [ 14 ] CVE-2010-3560 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3560 [ 15 ] CVE-2010-3561 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561 [ 16 ] CVE-2010-3562 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562 [ 17 ] CVE-2010-3563 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3563 [ 18 ] CVE-2010-3565 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565 [ 19 ] CVE-2010-3566 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566 [ 20 ] CVE-2010-3567 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567 [ 21 ] CVE-2010-3568 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568 [ 22 ] CVE-2010-3569 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569 [ 23 ] CVE-2010-3570 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3570 [ 24 ] CVE-2010-3571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3571 [ 25 ] CVE-2010-3572 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3572 [ 26 ] CVE-2010-3573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573 [ 27 ] CVE-2010-3574 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574 [ 28 ] CVE-2010-4422 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4422 [ 29 ] CVE-2010-4447 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4447 [ 30 ] CVE-2010-4448 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448 [ 31 ] CVE-2010-4450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450 [ 32 ] CVE-2010-4451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4451 [ 33 ] CVE-2010-4452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4452 [ 34 ] CVE-2010-4454 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4454 [ 35 ] CVE-2010-4462 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4462 [ 36 ] CVE-2010-4463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4463 [ 37 ] CVE-2010-4465 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465 [ 38 ] CVE-2010-4466 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4466 [ 39 ] CVE-2010-4467 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467 [ 40 ] CVE-2010-4468 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4468 [ 41 ] CVE-2010-4469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469 [ 42 ] CVE-2010-4470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470 [ 43 ] CVE-2010-4471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471 [ 44 ] CVE-2010-4472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472 [ 45 ] CVE-2010-4473 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4473 [ 46 ] CVE-2010-4474 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4474 [ 47 ] CVE-2010-4475 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4475 [ 48 ] CVE-2010-4476 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476 [ 49 ] CVE-2011-0802 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0802 [ 50 ] CVE-2011-0814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0814 [ 51 ] CVE-2011-0815 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815 [ 52 ] CVE-2011-0862 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862 [ 53 ] CVE-2011-0863 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0863 [ 54 ] CVE-2011-0864 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864 [ 55 ] CVE-2011-0865 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865 [ 56 ] CVE-2011-0867 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0867 [ 57 ] CVE-2011-0868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868 [ 58 ] CVE-2011-0869 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869 [ 59 ] CVE-2011-0871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871 [ 60 ] CVE-2011-0872 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872 [ 61 ] CVE-2011-0873 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0873 [ 62 ] CVE-2011-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389 [ 63 ] CVE-2011-3516 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3516 [ 64 ] CVE-2011-3521 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521 [ 65 ] CVE-2011-3544 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544 [ 66 ] CVE-2011-3545 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3545 [ 67 ] CVE-2011-3546 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3546 [ 68 ] CVE-2011-3547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547 [ 69 ] CVE-2011-3548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548 [ 70 ] CVE-2011-3549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3549 [ 71 ] CVE-2011-3550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3550 [ 72 ] CVE-2011-3551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551 [ 73 ] CVE-2011-3552 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552 [ 74 ] CVE-2011-3553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553 [ 75 ] CVE-2011-3554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554 [ 76 ] CVE-2011-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3555 [ 77 ] CVE-2011-3556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556 [ 78 ] CVE-2011-3557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557 [ 79 ] CVE-2011-3558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558 [ 80 ] CVE-2011-3560 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560 [ 81 ] CVE-2011-3561 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3561
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201111-02.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool.
Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/
TITLE: Hitachi Cosminexus Products Java Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA46694
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46694/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46694
RELEASE DATE: 2011-11-08
DISCUSS ADVISORY: http://secunia.com/advisories/46694/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/46694/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46694
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Hitachi has acknowledged multiple vulnerabilities in Hitachi Cosminexus products, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
The vulnerabilities are caused due to vulnerabilities in the bundled version of Cosminexus Developer's Kit for Java.
For more information: SA46512
Please see the vendor's advisory for a list of affected products. Please see the vendor's advisory for details.
ORIGINAL ADVISORY: http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-024/index.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. HP System Management Homepage (SMH) v7.2.0 and earlier running on Linux and Windows. This combines the two previous openjdk-6 advisories, DSA-2311-1 and DSA-2356-1.
CVE-2011-0862 Integer overflow errors in the JPEG and font parser allow untrusted code (including applets) to elevate its privileges.
CVE-2011-0864 Hotspot, the just-in-time compiler in OpenJDK, mishandled certain byte code instructions, allowing untrusted code (including applets) to crash the virtual machine.
CVE-2011-0865 A race condition in signed object deserialization could allow untrusted code to modify signed content, apparently leaving its signature intact.
CVE-2011-0867 Untrusted code (including applets) could access information about network interfaces which was not intended to be public. (Note that the interface MAC address is still available to untrusted code.)
CVE-2011-0868 A float-to-long conversion could overflow, , allowing untrusted code (including applets) to crash the virtual machine.
CVE-2011-0869 Untrusted code (including applets) could intercept HTTP requests by reconfiguring proxy settings through a SOAP connection.
CVE-2011-0871 Untrusted code (including applets) could elevate its privileges through the Swing MediaTracker code.
CVE-2011-3521 The CORBA implementation contains a deserialization vulnerability in the IIOP implementation, allowing untrusted Java code (such as applets) to elevate its privileges.
CVE-2011-3544 The Java scripting engine lacks necessary security manager checks, allowing untrusted Java code (such as applets) to elevate its privileges.
CVE-2011-3547 The skip() method in java.io.InputStream uses a shared buffer, allowing untrusted Java code (such as applets) to access data that is skipped by other code.
CVE-2011-3553 JAX-WS enables stack traces for certain server responses by default, potentially leaking sensitive information.
For the oldstable distribution (lenny), these problems have been fixed in version 6b18-1.8.10-0~lenny1. The complete list of recognized system roots may be viewed via the Keychain Access application. CVE-ID CVE-2014-1263 : Roland Moriz of Moriz GmbH
Data Security Available for: OS X Mavericks 10.9 and 10.9.1 Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS Description: Secure Transport failed to validate the authenticity of the connection. CVE-ID CVE-2014-1259
Finder Available for: OS X Mavericks 10.9 and 10.9.1 Impact: Accessing a file's ACL via Finder may lead to other users gaining unauthorized access to files Description: Accessing a file's ACL via Finder may corrupt the ACLs on the file. The issue was addressed by filtering unsafe unicode characters from display in filenames. Downloading a maliciously crafted Microsoft Office file may have led to an unexpected application termination or arbitrary code execution. To address these issues for applications using Secure Transport, the 1-byte fragment mitigation was enabled by default for this configuration. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2013:037 http://www.mandriva.com/en/support/security/
Package : fetchmail Date : April 5, 2013 Affected: Business Server 1.0
Problem Description:
Multiple vulnerabilities has been found and corrected in fetchmail:
Fetchmail version 6.3.9 enabled all SSL workarounds (SSL_OP_ALL) which contains a switch to disable a countermeasure against certain attacks against block ciphers that permit guessing the initialization vectors, providing that an attacker can make the application (fetchmail) encrypt some data for him -- which is not easily the case (aka a BEAST attack) (CVE-2011-3389).
A denial of service flaw was found in the way Fetchmail, a remote mail retrieval and forwarding utility, performed base64 decoding of certain NTLM server responses. Upon sending the NTLM authentication request, Fetchmail did not check if the received response was actually part of NTLM protocol exchange, or server-side error message and session abort.
This advisory provides the latest version of fetchmail (6.3.22) which is not vulnerable to these issues. The verification of md5 checksums and GPG signatures is performed automatically for you. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2012-09-19-2 OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004
OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 are now available and address the following:
Apache Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Multiple vulnerabilities in Apache Description: Apache is updated to version 2.2.22 to address several vulnerabilities, the most serious of which may lead to a denial of service. Further information is available via the Apache web site at http://httpd.apache.org/. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3368 CVE-2011-3607 CVE-2011-4317 CVE-2012-0021 CVE-2012-0031 CVE-2012-0053
BIND Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: A remote attacker may be able to cause a denial of service in systems configured to run BIND as a DNS nameserver Description: A reachable assertion issue existed in the handling of DNS records. This issue was addressed by updating to BIND 9.7.6-P1. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-4313
BIND Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4, OS X Mountain Lion v10.8 and v10.8.1 Impact: A remote attacker may be able to cause a denial of service, data corruption, or obtain sensitive information from process memory in systems configured to run BIND as a DNS nameserver Description: A memory management issue existed in the handling of DNS records. This issue was addressed by updating to BIND 9.7.6-P1 on OS X Lion systems, and BIND 9.8.3-P1 on OS X Mountain Lion systems. CVE-ID CVE-2012-1667
CoreText Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Applications that use CoreText may be vulnerable to an unexpected application termination or arbitrary code execution Description: A bounds checking issue existed in the handling of text glyphs, which may lead to out of bounds memory reads or writes. This issue was addressed through improved bounds checking. This issue does not affect Mac OS X v10.6 or OS X Mountain Lion systems. CVE-ID CVE-2012-3716 : Jesse Ruderman of Mozilla Corporation
Data Security Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4, OS X Mountain Lion v10.8 and v10.8.1 Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: TrustWave, a trusted root CA, has issued, and subsequently revoked, a sub-CA certificate from one of its trusted anchors. This sub-CA facilitated the interception of communications secured by Transport Layer Security (TLS). This update adds the involved sub-CA certificate to OS X's list of untrusted certificates.
DirectoryService Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8 Impact: If the DirectoryService Proxy is used, a remote attacker may cause a denial of service or arbitrary code execution Description: A buffer overflow existed in the DirectoryService Proxy. This issue was addressed through improved bounds checking. This issue does not affect OS X Lion and Mountain Lion systems. CVE-ID CVE-2012-0650 : aazubel working with HP's Zero Day Initiative
ImageIO Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in libpng's handling of PNG images. These issues were addressed through improved validation of PNG images. These issues do not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3026 : Juri Aedla CVE-2011-3048
ImageIO Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow issue existed in libTIFF's handling of TIFF images. This issue was addressed through improved validation of TIFF images. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-1173 : Alexander Gavrun working with HP's Zero Day Initiative
Installer Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Remote admins and persons with physical access to the system may obtain account information Description: The fix for CVE-2012-0652 in OS X Lion 10.7.4 prevented user passwords from being recorded in the system log, but did not remove the old log entries. This issue was addressed by deleting log files that contained passwords. This issue does not affect Mac OS X 10.6 or OS X Mountain Lion systems. CVE-ID CVE-2012-0652
International Components for Unicode Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Applications that use ICU may be vulnerable to an unexpected application termination or arbitrary code execution Description: A stack buffer overflow existed in the handling of ICU locale IDs. This issue was addressed through improved bounds checking. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-4599
Kernel Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: A malicious program could bypass sandbox restrictions Description: A logic issue existed in the handling of debug system calls. This may allow a malicious program to gain code execution in other programs with the same user privileges. This issue was addressed by disabling handling of addresses in PT_STEP and PT_CONTINUE. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0643 : iOS Jailbreak Dream Team
LoginWindow Available for: OS X Mountain Lion v10.8 and v10.8.1 Impact: A local user may be able to obtain other user's login passwords Description: A user-installed input method could intercept password keystrokes from Login Window or Screen Saver Unlock. This issue was addressed by preventing user-installed methods from being used when the system is handling login information. CVE-ID CVE-2012-3718 : An anonymous researcher
Mail Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing an e-mail message may lead to execution of web plugins Description: An input validation issue existed in Mail's handling of embedded web plugins. This issue was addressed by disabling third- party plug-ins in Mail. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3719 : Will Dormann of the CERT/CC
Mobile Accounts Available for: OS X Mountain Lion v10.8 and v10.8.1 Impact: A user with access to the contents of a mobile account may obtain the account password Description: Creating a mobile account saved a hash of the password in the account, which was used to login when the mobile account was used as an external account. The password hash could be used to determine the user's password. This issue was addressed by creating the password hash only if external accounts are enabled on the system where the mobile account is created. CVE-ID CVE-2012-3720 : Harald Wagener of Google, Inc.
PHP Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4, OS X Mountain Lion v10.8 and v10.8.1 Impact: Multiple vulnerabilities in PHP Description: >PHP is updated to version 5.3.15 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP web site at http://www.php.net CVE-ID CVE-2012-0831 CVE-2012-1172 CVE-2012-1823 CVE-2012-2143 CVE-2012-2311 CVE-2012-2386 CVE-2012-2688
PHP Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: PHP scripts which use libpng may be vulnerable to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of PNG files. This issue was addressed by updating PHP's copy of libpng to version 1.5.10. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3048
Profile Manager Available for: OS X Lion Server v10.7 to v10.7.4 Impact: An unauthenticated user could enumerate managed devices Description: An authentication issue existed in the Device Management private interface. This issue was addressed by removing the interface. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3721 : Derick Cassidy of XEquals Corporation
QuickLook Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted .pict file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of .pict files. This issue was addressed through improved validation of .pict files. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0671 : Rodrigo Rubira Branco (twitter.com/bsdaemon) from the Qualys Vulnerability & Malware Research Labs (VMRL)
QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in QuickTime's handling of sean atoms. This issue was addressed through improved bounds checking. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0670 : Tom Gallagher (Microsoft) and Paul Bates (Microsoft) working with HP's Zero Day Initiative
QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access existed in the handling of Sorenson encoded movie files. This issue was addressed through improved memory initialization. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3722 : Will Dormann of the CERT/CC
QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of RLE encoded movie files. This issue was addressed through improved bounds checking. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-0668 : Luigi Auriemma working with HP's Zero Day Initiative
Ruby Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. The Ruby OpenSSL module disabled the 'empty fragment' countermeasure which prevented these attacks. This issue was addressed by enabling empty fragments. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2011-3389
USB Available for: OS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4 Impact: Attaching a USB device may lead to an unexpected system termination or arbitrary code execution Description: A memory corruption issue existed in the handling of USB hub descriptors. This issue was addressed through improved handling of the bNbrPorts descriptor field. This issue does not affect OS X Mountain Lion systems. CVE-ID CVE-2012-3723 : Andy Davis of NGS Secure
Note: OS X Mountain Lion v10.8.2 includes the content of Safari 6.0.1. For further details see "About the security content of Safari 6.0.1" at http://http//support.apple.com/kb/HT5502
OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
The Software Update utility will present the update that applies to your system configuration. Only one is needed, either OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 or Security Update 2012-004.
For OS X Mountain Lion v10.8.1 The download file is named: OSXUpd10.8.2.dmg Its SHA-1 digest is: d6779e1cc748b78af0207499383b1859ffbebe33
For OS X Mountain Lion v10.8 The download file is named: OSXUpdCombo10.8.2.dmg Its SHA-1 digest is: b08f10233d362e39f20b69f91d1d73f5e7b68a2c
For OS X Lion v10.7.4 The download file is named: MacOSXUpd10.7.5.dmg Its SHA-1 digest is: e0a9582cce9896938a7a541bd431862d93893532
For OS X Lion v10.7 and v10.7.3 The download file is named: MacOSXUpdCombo10.7.5.dmg Its SHA-1 digest is: f7a26b164fa10dae4fe646e57b01c34a619c8d9b
For OS X Lion Server v10.7.4 The download file is named: MacOSXServerUpd10.7.5.dmg Its SHA-1 digest is: a891b03bfb4eecb745c0c39a32f39960fdb6796a
For OS X Lion Server v10.7 and v10.7.3 The download file is named: MacOSXServerUpdCombo10.7.5.dmg Its SHA-1 digest is: df6e1748ab0a3c9e05c890be49d514673efd965e
For Mac OS X v10.6.8 The download file is named: SecUpd2012-004.dmg Its SHA-1 digest is: 5b136e29a871d41012f0c6ea1362d6210c8b4fb7
For Mac OS X Server v10.6.8 The download file is named: SecUpdSrvr2012-004.dmg Its SHA-1 digest is: 9b24496be15078e58a88537700f2f39c112e3b28
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org
iQIcBAEBAgAGBQJQWhlbAAoJEPefwLHPlZEwwjwQAKrpQlZh1B2mkSTLxR7QZg6e Qm7SmIZL9sjl5gQkTxoAvOGxJ8uRdYPlJ1IpyU/MbK0GqO53KmFSeKkwCnvLKMaW pc6tiFaQ4zV4LEAwBAFEuqCsMyPEJqKDhYXl2cHQmWfAlrLCyCKfzGLy2mY2UnkE DQC2+ys70DChFv2GzyXlibBXAGMKDygJ5dVKynsi1ceZLYWbUJoGwlUtXPylBpnO QyGWXmEloPbhK6HJbKMNacuDdVcb26pvIeFiivkTSxPVlZ3ns2tAwEyvHrzA9O4n 7rQ6jvfDbguOZmM5sPFvVKBw2GVDBNU+G3T8ouIXhk6Pjhr4in8VFCb8MIMLb8hm 7YYn2z1TzKTNmUuYbwe6ukQvf57cPuW0bAvslbl6PgrzqorlNPU4rDoSvPrJx/RO BOYkcxfirevHDGibfkeqXPjL3h+bVrb1USZpAv+ZOAy0M89SHFcvMtpAhxnoGiV5 w4EyKB+9Yi/CSAk2Ne3Y5kHH7/v3pWV68aJwhVirya7ex3vnJ+M+lRLKSm2BUjL3 +9fykrJBDujFDXoCmK5CN5Wx36DSVZ4VO1h635crotudtcvd+LQ2VHma/Chav5wK q5SSllf4KEownpx6o/qTxpg5tcC4lvgTcsDHlYcNq2s8KTTjmOden8ar4h7M7QD2 xyBfrQfG/dsif6jGHaot =8joH -----END PGP SIGNATURE----- .
Release Date: 2012-05-15 Last Updated: 2012-05-15
Potential Security Impact: Remote Denial of service, unauthorized modification and disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities may allow remote Denial of Service (DoS), unauthorized modification and disclosure of information.
References: CVE-2010-4447, CVE-2010-4448, CVE-2010-4454, CVE-2010-4462, CVE-2010-4465, CVE-2010-4469, CVE-2010-4473, CVE-2010-4475, CVE-2010-4476, CVE-2011-0802, CVE-2011-0814, CVE-2011-0815, CVE-2011-0862, CVE-2011-0864, CVE-2011-0865, CVE-2011-0867, CVE-2011-0871, CVE-2011-3389, CVE-2011-3545, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560, CVE-2011-3563, CVE-2012-0499, CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2010-4447 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2010-4448 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6 CVE-2010-4454 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2010-4462 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2010-4465 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2010-4469 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2010-4473 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2010-4475 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2010-4476 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-0802 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-0814 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-0815 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-0862 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-0864 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-0865 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6 CVE-2011-0867 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2011-0871 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-3389 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2011-3545 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-3547 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2011-3548 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-3549 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-3552 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6 CVE-2011-3556 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2011-3557 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2011-3560 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 CVE-2011-3563 (AV:N/AC:L/Au:N/C:P/I:N/A:P) 6.4 CVE-2012-0499 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-0502 (AV:N/AC:L/Au:N/C:P/I:N/A:P) 6.4 CVE-2012-0503 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-0505 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-0506 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP is providing the following Java updates to resolve the vulnerabilities. The updates are available from: http://www.hp.com/go/java
These issues are addressed in the following versions of the HP Java:
HP-UX B.11.11 / SDK and JRE v1.4.2.28 or subsequent
HP-UX B.11.23 / SDK and JRE v1.4.2.28 or subsequent
HP-UX B.11.31 / SDK and JRE v1.4.2.28 or subsequent
MANUAL ACTIONS: Yes - Update
For Java v1.4.2.27 and earlier, update to Java v1.4.2.28 or subsequent.
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all HP-issued Security Bulletins and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.11 HP-UX B.11.23 HP-UX B.11.31 =========== Jpi14.JPI14-COM Jpi14.JPI14-COM-DOC Jpi14.JPI14-IPF32 Jpi14.JPI14-PA11 Jdk14.JDK14-COM Jdk14.JDK14-DEMO Jdk14.JDK14-IPF32 Jdk14.JDK14-IPF64 Jdk14.JDK14-PA11 Jdk14.JDK14-PA20 Jdk14.JDK14-PA20W Jdk14.JDK14-PNV2 Jdk14.JDK14-PWV2 Jre14.JRE14-COM Jre14.JRE14-COM-DOC Jre14.JRE14-IPF32 Jre14.JRE14-IPF32-HS Jre14.JRE14-IPF64 Jre14.JRE14-IPF64-HS Jre14.JRE14-PA11 Jre14.JRE14-PA11-HS Jre14.JRE14-PA20 Jre14.JRE14-PA20-HS Jre14.JRE14-PA20W Jre14.JRE14-PA20W-HS Jre14.JRE14-PNV2 Jre14.JRE14-PNV2-H Jre14.JRE14-PWV2 Jre14.JRE14-PWV2-H action: install revision 1.4.2.28.00 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 15 May 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: java-1.6.0-openjdk security update Advisory ID: RHSA-2011:1380-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1380.html Issue date: 2011-10-18 CVE Names: CVE-2011-3389 CVE-2011-3521 CVE-2011-3544 CVE-2011-3547 CVE-2011-3548 CVE-2011-3551 CVE-2011-3552 CVE-2011-3553 CVE-2011-3554 CVE-2011-3556 CVE-2011-3557 CVE-2011-3558 CVE-2011-3560 =====================================================================
- Summary:
Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit.
A flaw was found in the Java RMI (Remote Method Invocation) registry implementation. A remote RMI client could use this flaw to execute arbitrary code on the RMI server running the registry. (CVE-2011-3556)
A flaw was found in the Java RMI registry implementation. A remote RMI client could use this flaw to execute code on the RMI server with unrestricted privileges. (CVE-2011-3557)
A flaw was found in the IIOP (Internet Inter-Orb Protocol) deserialization code. An untrusted Java application or applet running in a sandbox could use this flaw to bypass sandbox restrictions by deserializing specially-crafted input. (CVE-2011-3521)
It was found that the Java ScriptingEngine did not properly restrict the privileges of sandboxed applications. An untrusted Java application or applet running in a sandbox could use this flaw to bypass sandbox restrictions. (CVE-2011-3544)
A flaw was found in the AWTKeyStroke implementation. An untrusted Java application or applet running in a sandbox could use this flaw to bypass sandbox restrictions. (CVE-2011-3548)
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the Java2D code used to perform transformations of graphic shapes and images. An untrusted Java application or applet running in a sandbox could use this flaw to bypass sandbox restrictions. (CVE-2011-3551)
An insufficient error checking flaw was found in the unpacker for JAR files in pack200 format. A specially-crafted JAR file could use this flaw to crash the Java Virtual Machine (JVM) or, possibly, execute arbitrary code with JVM privileges. (CVE-2011-3554)
It was found that HttpsURLConnection did not perform SecurityManager checks in the setSSLSocketFactory method. An untrusted Java application or applet running in a sandbox could use this flaw to bypass connection restrictions defined in the policy. An attacker able to perform a chosen plain text attack against a connection mixing trusted and untrusted data could use this flaw to recover portions of the trusted data sent over the connection. (CVE-2011-3389)
Note: This update mitigates the CVE-2011-3389 issue by splitting the first application data record byte to a separate SSL/TLS protocol record. This mitigation may cause compatibility issues with some SSL/TLS implementations and can be disabled using the jsse.enableCBCProtection boolean property. This can be done on the command line by appending the flag "-Djsse.enableCBCProtection=false" to the java command.
An information leak flaw was found in the InputStream.skip implementation. An untrusted Java application or applet could possibly use this flaw to obtain bytes skipped by other threads. (CVE-2011-3547)
A flaw was found in the Java HotSpot virtual machine. An untrusted Java application or applet could use this flaw to disclose portions of the VM memory, or cause it to crash. (CVE-2011-3558)
The Java API for XML Web Services (JAX-WS) implementation in OpenJDK was configured to include the stack trace in error messages sent to clients. A remote client could possibly use this flaw to obtain sensitive information. (CVE-2011-3553)
It was found that Java applications running with SecurityManager restrictions were allowed to use too many UDP sockets by default. If multiple instances of a malicious application were started at the same time, they could exhaust all available UDP sockets on the system. (CVE-2011-3552)
This erratum also upgrades the OpenJDK package to IcedTea6 1.9.10. Refer to the NEWS file, linked to in the References, for further information.
All users of java-1.6.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
- Bugs fixed (http://bugzilla.redhat.com/):
737506 - CVE-2011-3389 HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) 745379 - CVE-2011-3560 OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) 745387 - CVE-2011-3547 OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) 745391 - CVE-2011-3551 OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) 745397 - CVE-2011-3552 OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) 745399 - CVE-2011-3544 OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) 745442 - CVE-2011-3521 OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) 745447 - CVE-2011-3554 OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) 745459 - CVE-2011-3556 OpenJDK: RMI DGC server remote code execution (RMI, 7077466) 745464 - CVE-2011-3557 OpenJDK: RMI registry privileged code execution (RMI, 7083012) 745473 - CVE-2011-3548 OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) 745476 - CVE-2011-3553 OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) 745492 - CVE-2011-3558 OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm java-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm
i386: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm
x86_64: java-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2011-3389.html https://www.redhat.com/security/data/cve/CVE-2011-3521.html https://www.redhat.com/security/data/cve/CVE-2011-3544.html https://www.redhat.com/security/data/cve/CVE-2011-3547.html https://www.redhat.com/security/data/cve/CVE-2011-3548.html https://www.redhat.com/security/data/cve/CVE-2011-3551.html https://www.redhat.com/security/data/cve/CVE-2011-3552.html https://www.redhat.com/security/data/cve/CVE-2011-3553.html https://www.redhat.com/security/data/cve/CVE-2011-3554.html https://www.redhat.com/security/data/cve/CVE-2011-3556.html https://www.redhat.com/security/data/cve/CVE-2011-3557.html https://www.redhat.com/security/data/cve/CVE-2011-3558.html https://www.redhat.com/security/data/cve/CVE-2011-3560.html https://access.redhat.com/security/updates/classification/#critical http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFOngvzXlSAg2UNWIIRArb8AKCaS923HYBco1E2eOOedT1aefjmyACgherU 1E1DMZpv3ExBmKhD4Emi2no= =sMXo -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
CVE-2011-4362
Xi Wang discovered that the base64 decoding routine which is used to decode user input during an HTTP authentication, suffers of a signedness issue when processing user input. As a result it is possible to force lighttpd to perform an out-of-bounds read which results in Denial of Service conditions.
CVE-2011-3389
When using CBC ciphers on an SSL enabled virtual host to communicate with certain client, a so called "BEAST" attack allows man-in-the-middle attackers to obtain plaintext HTTP traffic via a blockwise chosen-boundary attack (BCBA) on an HTTPS session. Technically this is no lighttpd vulnerability. However, lighttpd offers a workaround to mitigate this problem by providing a possibility to disable CBC ciphers.
This updates includes this option by default. System administrators are advised to read the NEWS file of this update (as this may break older clients)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201109-0130", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "web server", "scope": "eq", "trust": 1.8, "vendor": "hitachi", "version": "02-03" }, { "model": "web server 02-04-/a", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "web server", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "02-01" }, { "model": "web server", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "02-02" }, { "model": "esx", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "4.0" }, { "model": "esx", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "4.1" }, { "model": "esx", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "3.5" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.10" }, { "model": "curl", "scope": "gte", "trust": 1.0, "vendor": "haxx", "version": "7.10.6" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "11.10" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.2" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "11.04" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.2" }, { "model": "browser", "scope": "eq", "trust": 1.0, "vendor": "opera", "version": null }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "simatic rf615r", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.2.1" }, { "model": "curl", "scope": "lte", "trust": 1.0, "vendor": "haxx", "version": "7.23.1" }, { "model": "chrome", "scope": "eq", "trust": 1.0, "vendor": "google", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "6.0" }, { "model": "windows", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "internet explorer", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "firefox", "scope": "eq", "trust": 1.0, "vendor": "mozilla", "version": null }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "simatic rf68xr", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.2.1" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "5.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.04" }, { "model": "jre 17", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "web server 01-02-/b", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-50" }, { "model": "jre 1.4.2 30", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.5.0 16", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "sdk 1.4.2 25", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-00" }, { "model": "jre 1.4.2 25", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jdk 1.6.0 03", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 1.4.2 11", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "ucosminexus application server-r", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-50" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 1.5.0 11", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 24", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.4.2 22", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.6.0 23", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "sdk 1.4.2 27", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 1.5.0 25", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.5.0 29", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 1.6.0 11", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.5.0 17", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 17", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 24", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.5.0 27", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-50" }, { "model": "sdk 1.4.2 30", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 03", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 1.6.0 26", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.4.2 31", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.4.2 13", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jdk 1.5.0 23", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.5.0 26", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.7" }, { "model": "sdk 1.4.2 16", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.5.0 29", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-50" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-00" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-50" }, { "model": "jdk 1.5.0 31", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 16", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 1.5.0 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.5.0 32", "scope": "ne", "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.5.0 30", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 18", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 1.4.2 11", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 0 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 1.5.0 10", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 24", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.5.0 27", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "sdk 1.4.2 29", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 1.4.2 14", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.5.0 14", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.5.0 24", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "web server 01-02-/c", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jre 1.5.0 25", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 24", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.5.0 28", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "ucosminexus operator for service platform", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-00" }, { "model": "jdk 1.5.0 13", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 16", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 1.4.2 17", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 15", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 1.6.0 21", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 1.4.2 33", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "sdk 1.4.2 31", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 28", "scope": "ne", "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.6.0 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 1.6.0 22", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.5.0 31", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 1.4.2 28", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 21", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 27", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 15", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 14", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "ucosminexus application server-r", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-00" }, { "model": "jre 1.6.0 02", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-00" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 1.5.0 28", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.4.2 15", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "sdk 1.4.2 26", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 28", "scope": "ne", "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.4.2 29", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 17", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "ucosminexus primary server base", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-00" }, { "model": "ucosminexus primary server base", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-50" }, { "model": "jre 1.4.2 32", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.5.0 26", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 33", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 26", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.5.0 30", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.5.0 32", "scope": "ne", "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 1.4.2 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "ucosminexus operator for service platform", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "09-50" }, { "model": "jdk 17", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jdk 18", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "sdk 1.4.2 22", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.7" }, { "model": "jdk 1.6.0 02", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.6.0 01", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "web server 01-02-/a", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 1.4.2 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.5.0 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.5.0 13", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 25", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "sdk 1.4.2 32", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 22", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 1.4.2 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 23", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "sdk 1.4.2 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 27", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.6.0 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.5.0 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.5.0 23", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 22", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "sdk 1.4.2 13", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.6.0 25", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 14", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 22", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "google", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "opera", "version": null }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "st ard edition version 4" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.4 (ruby)" }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 5" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "st ard" }, { "model": "vcenter", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "5.0 (windows)" }, { "model": "vcenter", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.1 (windows)" }, { "model": "firefox", "scope": null, "trust": 0.8, "vendor": "mozilla", "version": null }, { "model": "cosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "enterprise version 6" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "for service platform" }, { "model": "iplanet web proxy server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "4.0" }, { "model": "windows 7", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x64) sp1 before" }, { "model": "ucosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "base(64)" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.3 (curl)" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.0 to 4.3.5 (iphone 3gs iphone 4)" }, { "model": "ruggedcom win5100", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "all versions" }, { "model": "secureware/pki application development kit", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "v2.1" }, { "model": "cosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "base version 6" }, { "model": "ucosminexus portal framework", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "entry set" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7.2 (java)" }, { "model": "windows xp", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "sp3 sp3" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.9" }, { "model": "windows vista", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x64) sp2" }, { "model": "ucosminexus service", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "platform" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "smart edition" }, { "model": "windows server 2003", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "sp2" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.8.5 (secure transport)" }, { "model": "tuning manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "software" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "professional for plug-in" }, { "model": "web server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "opera", "scope": null, "trust": 0.8, "vendor": "opera asa", "version": null }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "11.2.0.3" }, { "model": "vcenter", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.0 (windows)" }, { "model": "websam securemaster", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterpriseaccessmanager version 3.x to 6.x" }, { "model": "cosminexus developer\u0027s kit for java", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "windows server 2008", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x86) sp2" }, { "model": "websam securemaster", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprisedirectoryserver/rdb cooperation system all versions" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "12.1.2.0" }, { "model": "mac os x", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "(cfnetwork ssl python)" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "st ard-r" }, { "model": "cosminexus server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "st ard edition version 4" }, { "model": "hyperion", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "essbase 11.1.2.2" }, { "model": "cosminexus client", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 6" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "-r" }, { "model": "windows server 2008", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "r2(itanium) sp2" }, { "model": "infocage", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "pc security all versions" }, { "model": "xcode", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "4.4" }, { "model": "ruggedcom win5100", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "software v4.4" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8 (apache)" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.2 (apache)" }, { "model": "cosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 6" }, { "model": "ruggedcom win7200", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "all versions" }, { "model": "windows server 2008", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "r2(x64) sp2" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7.2 (java)" }, { "model": "xcode", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "(os x v10.7.4 and later )" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "(64)" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8 (apache)" }, { "model": "ruggedcom win5200", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "all versions" }, { "model": "ruggedcom win7200", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "software v4.4" }, { "model": "ruggedcom win7000", "scope": "lt", "trust": 0.8, "vendor": "siemens", "version": "all versions" }, { "model": "internet explorer", "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.2 (apache)" }, { "model": "websam securemaster", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "accesscontrolserver version 3.x to 6.x" }, { "model": "ucosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "base" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "professional version 6" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.4 (ruby)" }, { "model": "cosminexus http server", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "base" }, { "model": "iplanet web server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "7.0" }, { "model": "ruggedcom win7000", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "software v4.4" }, { "model": "virtualcenter", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "2.5 (windows)" }, { "model": "fusion middleware", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "12.1.3" }, { "model": "windows server 2008", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x64) sp2" }, { "model": "developer\u0027s kit for java", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "architect" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "for plug-in" }, { "model": "hp system management homepage", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "device manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "software" }, { "model": "java system web server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "6.1" }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "11.1.0.7" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 5" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "(64)" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "express" }, { "model": "windows vista", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "sp2" }, { "model": "windows server 2008", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(itanium) sp2" }, { "model": "web server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- security enhancement" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "light" }, { "model": "windows 7", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x32) sp1 before" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.3 (curl)" }, { "model": "database", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "11.2.0.2" }, { "model": "windows server 2003", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(itanium) sp2" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "enterprise" }, { "model": "cosminexus server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "web edition version 4" }, { "model": "windows xp", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x64) sp2" }, { "model": "hyperion", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "essbase 11.1.2.3" }, { "model": "tv", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "4.0 to 4.3" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "01" }, { "model": "ucosminexus service", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "platform - messaging" }, { "model": "cosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 5" }, { "model": "websam securemaster", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "accesscontrolplugin version 3.x to 6.x" }, { "model": "processing kit for xml", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "st ard version 6" }, { "model": "hirdb for java /xml", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "light" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.1 to 4.3.5 (ipod touch first 3 after generation )" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "st ard" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "light version 6" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.2 to 4.3.5 (ipad)" }, { "model": "ruggedcom win5200", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "software v4.4" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "professional" }, { "model": "cosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "st ard version 6" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "chrome", "scope": null, "trust": 0.8, "vendor": "google", "version": null }, { "model": "windows server 2003", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "(x64) sp2" }, { "model": "ucosminexus client )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-50" }, { "model": "ucosminexus service platform )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-50" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jdk 01-b06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.6" }, { "model": "ucosminexus primary server base )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-50" }, { "model": "project openssl 1.0.0a", "scope": null, "trust": 0.6, "vendor": "openssl", "version": null }, { "model": "ucosminexus operator for service platform )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "web server linux", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "03-00" }, { "model": "web server 02-04-/b", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "project openssl 0.9.8m", "scope": null, "trust": 0.6, "vendor": "openssl", "version": null }, { "model": "jre 1.5.0.0 09", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 28", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "ucosminexus service architect )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "ucosminexus developer )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-50" }, { "model": "ucosminexus service architect )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-50" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "cosminexus http server windows", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "web server hp-ux", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "03-00" }, { "model": "jdk 1.5.0.0 08", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "web server", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "01-02" }, { "model": "ucosminexus primary server base )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "project openssl 0.9.8n", "scope": null, "trust": 0.6, "vendor": "openssl", "version": null }, { "model": "ucosminexus application server-r )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 1.5.0 12", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jre .0 02", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "cosminexus http server windows", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00-10" }, { "model": "windows server sp1", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "2003x64" }, { "model": "web server linux", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "04-00" }, { "model": "jre 1.6.0 2", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "ucosminexus client )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "jre 1.4.2 27", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jdk 07-b03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "ucosminexus application server-r )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-50" }, { "model": "jre 1.5.0.0 08", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "web server", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "02-04" }, { "model": "jdk 1.5.0.0 12", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "windows server sp2", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "2003x64" }, { "model": "ucosminexus operator for service platform )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-50" }, { "model": "jdk 1.5.0.0 09", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "project openssl 0.9.8o", "scope": null, "trust": 0.6, "vendor": "openssl", "version": null }, { "model": "jdk 1.5.0.0 11", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jdk 11-b03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-50" }, { "model": "ucosminexus application server )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-50" }, { "model": "jre 1.5.0.0 07", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 01", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 20", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "windows xp home sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows vista edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "x640" }, { "model": "software opera web browser beta1", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.50" }, { "model": "fusion middleware 11g release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "111.1.17" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.80" }, { "model": "java se sr8 fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "11.11" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.2" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "nonstop server h06.16.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.53" }, { "model": "enterprise linux as extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "windows xp professional edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "x64" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.14.1" }, { "model": "windows server for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20080" }, { "model": "java se", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "11.50" }, { "model": "web server windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.63" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.70" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.10" }, { "model": "windows xp tablet pc edition sp3", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows vista business 64-bit edition x64-enterprise", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.7" }, { "model": "project openssl b-36.8", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.0-68" }, { "model": "power systems 350.c0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.127" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.225" }, { "model": "nonstop server j06.09.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.219" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.30" }, { "model": "web server windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-10-03" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.15.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.20" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.2.1" }, { "model": "power systems 350.b1", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "web server windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-10-01(x64)" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "java se sr12", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.0" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0.0.52" }, { "model": "windows server standard edition gold itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-" }, { "model": "flex system imm2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.00" }, { "model": "windows server r2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "cosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.12" }, { "model": "nonstop server h06.18.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.15.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.22.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "windows xp media center edition sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2005" }, { "model": "websphere datapower soa appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8" }, { "model": "websphere datapower soa appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "rational appscan enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.51" }, { "model": "meeting exchange web conferencing server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "-0" }, { "model": "java se", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6" }, { "model": "windows server r2 web edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "system management homepage c", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.10.186" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.2" }, { "model": "nonstop server j06.08.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "windows xp home sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows vista home basic sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "nonstop server j06.16", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.200" }, { "model": "ucosminexus client for plug-in", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "nonstop server j6.0.14.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "java sdk sr10", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "vplex geosynchrony sp1", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "5.2" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.68" }, { "model": "forms and reports 11g release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "211.1.2.1" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.00" }, { "model": "windows for 32-bit systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "70" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "770.22" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "flex system chassis management module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "cosminexus application server", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.303" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "windows server r2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008x640" }, { "model": "jdk 1.5.0 11", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "software opera web browser 1win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "ucosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "flex system imm2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.211" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.104" }, { "model": "nonstop server j06.07.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0.0-95" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "jrockit r28.0.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.51" }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "web server )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-03" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.21.6" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "cosminexus developer\u0027s kit for java (windows(x8", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-50-01" }, { "model": "software opera web browser", "scope": "ne", "trust": 0.3, "vendor": "opera", "version": "11.51" }, { "model": "cosminexus developer\u0027s kit for java", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-00-06" }, { "model": "ucosminexus application server light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "nonstop server h06.15.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14" }, { "model": "windows server standard edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20080" }, { "model": "system management homepage b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5.146" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.54" }, { "model": "windows server sp2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-x64" }, { "model": "system networking ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.51" }, { "model": "windows server gold standard", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "jrockit r28.1.1", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "773.10" }, { "model": "windows server r2 standard edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20080" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.40" }, { "model": "system management homepage a", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.11.197" }, { "model": "web server hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-10" }, { "model": "firefox beta1", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "4.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.15210" }, { "model": "windows vista business", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.17" }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.11.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "windows server for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20080" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.10" }, { "model": "windows server standard edition gold web", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "windows server itanium sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.3" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "windows xp home sp3", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "java sdk", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.5" }, { "model": "software opera web browser beta2", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.50" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.018" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.019" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.17" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "windows vista ultimate 64-bit edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "11.00" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.10" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.6" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "enterprise linux server supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.60" }, { "model": "nonstop server j06.13.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.25" }, { "model": "windows home premium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "7-x32" }, { "model": "jdk 1.5.0 11-b03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "windows server gold compute cluster", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.02" }, { "model": "rsa bsafe micro edition suite", "scope": "ne", "trust": 0.3, "vendor": "emc", "version": "4.0.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.19" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "windows server standard edition gold datacenter", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "enterprise linux workstation supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "access manager sp2", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.1" }, { "model": "windows vista home premium sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.24" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.65" }, { "model": "windows vista home premium 64-bit edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.15" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.60" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.12.3" }, { "model": "windows server r2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "project openssl 1.0.0c", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.19" }, { "model": "windows server sp1 platform sdk", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "software opera web browser beta1", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.10" }, { "model": "windows server enterprise edition itanium sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.00" }, { "model": "windows server sp2 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.100" }, { "model": "java se", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "windows server r2 x64-datacenter", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "cosminexus http server hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.7" }, { "model": "windows server enterprise edition itanium sp2 itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows for 32-bit systems sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "7" }, { "model": "windows vista business 64-bit edition x64-ultimate", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows xp professional edition sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "x64" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.1" }, { "model": "nonstop server j06.15", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.9.2" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "windows rc", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "7" }, { "model": "windows server for 32-bit systems sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "callpilot", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "windows vista home premium", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "cosminexus", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "9.0" }, { "model": "vplex geosynchrony", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "4.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "web server windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-10-10" }, { "model": "ucosminexus application server enterprise )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-80" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "control patch", "scope": "eq", "trust": 0.3, "vendor": "kerio", "version": "7.1.01" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.133" }, { "model": "nonstop server h06.21.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3.132" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.13.2" }, { "model": "access manager sp1", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.1" }, { "model": "linux enterprise java sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "jre 1.5.0 08", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "software opera web browser", "scope": "ne", "trust": 0.3, "vendor": "opera", "version": "11.60" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.20" }, { "model": "web server windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-00-060" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.101" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "ucosminexus application server smart edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.14" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.52" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0" }, { "model": "meeting exchange recording server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "-0" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "5" }, { "model": "desktop extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.52" }, { "model": "nonstop server j06.06.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5" }, { "model": "windows server web edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "openpages grc platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "windows server r2 enterprise edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "rsa bsafe ssl-c", "scope": "ne", "trust": 0.3, "vendor": "emc", "version": "2.8.6" }, { "model": "nonstop server j06.06.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.17.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "5" }, { "model": "jdk update21", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.3" }, { "model": "simatic rf68xr", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "3.2.1" }, { "model": "network node manager i", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.1" }, { "model": "windows server standard edition release candidate", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "windows server standard edition sp2 web", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "fusion middleware", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.3.0.0" }, { "model": "database 11g release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "211.2.0.3" }, { "model": "rational appscan enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.5" }, { "model": "windows server terminal services", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.54" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.9" }, { "model": "nonstop server h06.17.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.84" }, { "model": "jre 21", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "windows server standard edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "project openssl 0.9.8s", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "ios beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "windows vista home premium 64-bit edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1.0.103" }, { "model": "cms server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "16.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "windows vista business 64-bit edition x86-ultimate", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "linux enterprise java sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "java se sr1", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "windows server gold datacenter", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.53" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4" }, { "model": "windows server r2 enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.70" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.1" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "nonstop server h06.27", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.20.2" }, { "model": "nonstop server j06.14.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.100" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.10.186" }, { "model": "rational appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8" }, { "model": "windows server datacenter edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "jrockit r27.6.0-50", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.5.015" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.105" }, { "model": "windows server r2 datacenter edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "jdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6" }, { "model": "nonstop server j06.08.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.306" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.64" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "windows server sp1 compute cluster", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.13" }, { "model": "java se", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "web server hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-10-02" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.01" }, { "model": "jrockit r27.6.5", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.222" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.107" }, { "model": "java se sr10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "nonstop server j06.04.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "web server solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-00-01" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.2.77" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.217" }, { "model": "windows vista business 64-bit edition x86-enterprise", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.40" }, { "model": "linux enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "windows server gold x64-datacenter", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.22" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0.96" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.2" }, { "model": "web server security enhancement", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-0" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "java system application server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.77" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "project openssl g", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "windows server for itanium-based systems r2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1" }, { "model": "rsa bsafe ssl-j", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "6.0" }, { "model": "windows server for itanium-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20080" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.112" }, { "model": "websphere datapower soa appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.344" }, { "model": "cosminexus developer\u0027s kit for java (windows(x8", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-00-06" }, { "model": "jdk update24", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.215" }, { "model": "meeting exchange client registration server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "-0" }, { "model": "openpages grc platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.2" }, { "model": "enterprise linux desktop supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "rational appscan enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1.0.102" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.57" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "760.31" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.18" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "windows server enterprise edition sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "web server hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-00-05" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.81" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "vcenter", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.11.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.215" }, { "model": "windows server r2 standard edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "windows server r2 for x64-based systems sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "software opera web browser j", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "nonstop server h06.25", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.302" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.19.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.5" }, { "model": "windows vista business 64-bit edition sp1 x86-enterprise", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.1-73" }, { "model": "power systems 350.b0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "openpages grc platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.13" }, { "model": "database 11g release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "211.2.0.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.20" }, { "model": "windows vista edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "x64" }, { "model": "enterprise linux for sap server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "security appscan standard", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.00" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.2" }, { "model": "project openssl beta2", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "system management homepage b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.2.77" }, { "model": "java se sr9", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.68" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "760.30" }, { "model": "nonstop server j06.07.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "message networking sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux enterprise server for vmware sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.549.0" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.013" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.50" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.207" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.1" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.80" }, { "model": "nonstop server j06.08.04", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "rational appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "flex system cmm 1.40.2q", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.06" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "jdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5" }, { "model": "cosminexus developer\u0027s kit for java (windows(x6", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-50-01" }, { "model": "tv", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "4.4" }, { "model": "nonstop server h06.24", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "access manager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.1" }, { "model": "windows server datacenter edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "nonstop server h06.16.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer professional for plug-in", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "nonstop server h06.18.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.223" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.23" }, { "model": "windows server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "cosminexus", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0" }, { "model": "jdk update13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "windows server r2 datacenter edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13" }, { "model": "windows server gold x64-enterprise", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "nonstop server h06.19.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "windows for itanium-based systems sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "7" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "project openssl 1.0.0e", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "windows server enterprise edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "773.00" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.128" }, { "model": "jrockit r28.0.1", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "jdk update19", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "openpages grc platform", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.15" }, { "model": "windows server r2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "software opera web browser beta build", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.2012981" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.222" }, { "model": "windows server for x64-based systems r2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "windows server datacenter edition sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "windows server r2 datacenter sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.14.20" }, { "model": "cosminexus studio standard edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9" }, { "model": "windows xp tablet pc edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "project openssl l", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "web server", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-05" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.53" }, { "model": "cms server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "16.1" }, { "model": "windows server r2 itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20080" }, { "model": "windows xp professional sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows server for itanium-based systems sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "nonstop server j06.11.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "java se sr9-fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0.0" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "collax", "version": "5.5.11" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.72" }, { "model": "windows server standard edition sp2 hpc", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "update manager update", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.01" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.551.1" }, { "model": "glassfish enterprise server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.1.1" }, { "model": "windows vista ultimate", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.10" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.20" }, { "model": "virtualcenter", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5" }, { "model": "jrockit r27.6.7", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "rational appscan enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.01" }, { "model": "nonstop server h06.20.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "vcenter", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.20" }, { "model": "jre 10-b03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "jrockit r27.6.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.61" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "java se", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.2" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "rational appscan enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.90" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "nonstop server j06.05.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5" }, { "model": "nonstop server j06.07.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "windows server gold", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.4" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.53" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.10.8" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.20.1" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.71" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1.104" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.220" }, { "model": "java ibm 31-bit sdk for z/os", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "windows server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20080" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.16.4" }, { "model": "cosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.10" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.1.73" }, { "model": "project openssl beta3", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "java se sr5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "rsa bsafe ssl-c", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "2.8.5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "cosminexus http server windows", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-00-11" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "760.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.102" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "nonstop server h06.21.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "windows vista business 64-bit edition sp1 x64-enterprise", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.10" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.16" }, { "model": "java se", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7" }, { "model": "software opera web browser beta1", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.60" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.5" }, { "model": "ucosminexus service platform aix", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00(64)" }, { "model": "web server windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-10-03(x64)" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "linux enterprise software development kit sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.8.179" }, { "model": "web server aix", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-00" }, { "model": "software opera web browser beta1", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.00" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "770.20" }, { "model": "power systems 350.d0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.224" }, { "model": "business server", "scope": "ne", "trust": 0.3, "vendor": "collax", "version": "5.5.12" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.61" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux hpc node supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop supplementary client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.308" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.10.6" }, { "model": "jdk update17", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "windows server datacenter edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "rational appscan enterprise", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "windows server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "cosminexus http server", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-00-13" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.12" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.54" }, { "model": "nonstop server j06.05.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser .6win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "openpages grc platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.221" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.201" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.672.2" }, { "model": "jdk 0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "jdk update20", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "windows server standard edition r2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.62" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0.1" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.237" }, { "model": "linux enterprise desktop sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "windows vista business 64-bit edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "nonstop server h06.17.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "773.02" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "770.31" }, { "model": "nonstop server j06.08.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "nonstop server j06.10.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "windows vista home premium 64-bit edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows xp embedded sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows server datacenter edition itanium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "nonstop server h06.17.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "freeflow print server 91.d2.32", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "windows vista business 64-bit edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "cosminexus server web edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "linux enterprise for sap applications sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2.6" }, { "model": "rsa bsafe micro edition suite", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "3.1" }, { "model": "windows vista enterprise 64-bit edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows server sp1 storage", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "project openssl 1.0.0d", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "meeting exchange streaming server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "-0" }, { "model": "processing kit for xml", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "rsa bsafe micro edition suite", "scope": "ne", "trust": 0.3, "vendor": "emc", "version": "3.2.6" }, { "model": "java se sr11 pf1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.3" }, { "model": "web server hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-00" }, { "model": "groupware suite", "scope": "eq", "trust": 0.3, "vendor": "collax", "version": "5.5.11" }, { "model": "cosminexus studio web edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.213" }, { "model": "nonstop server h06.15.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.06" }, { "model": "cosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.15" }, { "model": "windows server standard edition itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "nonstop server j06.14", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "760.40" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.70" }, { "model": "windows vista ultimate 64-bit edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "openpages grc platform", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5" }, { "model": "jre 1.5.0 09-b03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "system integrated management module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x2" }, { "model": "windows vista enterprise 64-bit edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "nonstop server h06.26", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "rsa bsafe ssl-j", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "5.1.1" }, { "model": "windows server web edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.218" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "nonstop server j06.13", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.14" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "770.21" }, { "model": "nonstop server j06.09.04", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "web server windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-10" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "messaging application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.6.156" }, { "model": "windows for itanium-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "70" }, { "model": "ir", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.10" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.45" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.7" }, { "model": "software opera web browser mac", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "nonstop server j06.05.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "cosminexus server standard edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "rational policy tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.0.1" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.216" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "rsa bsafe micro edition suite", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "4.0" }, { "model": "rational policy tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "rsa bsafe micro edition suite", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "3.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.19" }, { "model": "project openssl beta5", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.0" }, { "model": "windows server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows server enterprise edition itanium sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows server gold enterprise", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows vista sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.6" }, { "model": "websphere datapower soa appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8.1" }, { "model": "jrockit r27.1.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "fusion middleware 11g release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "111.1.16" }, { "model": "windows vista business 64-bit edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.23.1" }, { "model": "websphere multichannel bank transformation toolkit", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "vplex geosynchrony", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "5.2.1" }, { "model": "software opera web browser b", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "enterprise linux supplementary server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "jrockit r28.1.4", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2.9.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1.0-103" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.12.201" }, { "model": "windows xp media center edition sp3", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.16" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.01" }, { "model": "rational appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.12" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "nonstop server j06.09.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "windows server enterprise edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "jrockit r27.6.6", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "nonstop server j06.06.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "project openssl 0.9.8q", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "windows xp media center edition", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.012" }, { "model": "software opera web browser beta2", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.17" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.15.3" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "760.11" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2" }, { "model": "bladecenter advanced management module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.2.127" }, { "model": "java sdk sr13 fp11", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.4.2" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.50" }, { "model": "cms server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "16.0" }, { "model": "windows server gold storage", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "jrockit r27.6.8", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.02" }, { "model": "windows xp mode", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "70" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "windows vista home premium sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.310" }, { "model": "cosminexus developer\u0027s kit for java (windows(x6", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-00-06" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.62" }, { "model": "web server hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-10-01" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.1" }, { "model": "windows server r2 sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008x64" }, { "model": "callpilot", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "project openssl 0.9.8g", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "linux enterprise software development kit sp1 for sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.11" }, { "model": "windows vista home basic 64-bit edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "windows server standard edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "java se sr12-fp5", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "openjdk", "scope": "eq", "trust": 0.3, "vendor": "openjdk", "version": "6" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.202" }, { "model": "windows vista business sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows server standard edition gold hpc", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-" }, { "model": "windows server gold x64-standard", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "web server windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-00-05" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.10" }, { "model": "java sdk", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.15.5" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.30" }, { "model": "jrockit r27.6.4", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.1" }, { "model": "messaging storage server sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.186" }, { "model": "windows server sp2 storage", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.015" }, { "model": "windows vista enterprise sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "cosminexus application server", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "5.0" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.219" }, { "model": "java se sr10", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.94" }, { "model": "cosminexus http server", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00-10" }, { "model": "nonstop server h06.20.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "java se sr11", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "windows server standard edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008x64" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "770.10" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.80" }, { "model": "ucosminexus service platform hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "freeflow print server 73.c5.11", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "rsa bsafe ssl-j", "scope": "ne", "trust": 0.3, "vendor": "emc", "version": "6.0.1" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.50" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "web server windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-00" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.02" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.52" }, { "model": "windows xp tablet pc edition", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows professional", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "70" }, { "model": "ucosminexus developer )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.204" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.551.0" }, { "model": "tls", "scope": "eq", "trust": 0.3, "vendor": "ietf", "version": "1.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.301" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.90" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.00" }, { "model": "rsa bsafe ssl-j", "scope": "ne", "trust": 0.3, "vendor": "emc", "version": "5.1.2" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.4" }, { "model": "jdk update23", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.112" }, { "model": "linux enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.03" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.0.2" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.10.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.6" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.51" }, { "model": "jre 28", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "system management homepage b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.10.186" }, { "model": "firefox beta", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.62" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "windows server itanium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "control", "scope": "eq", "trust": 0.3, "vendor": "kerio", "version": "7.1.0" }, { "model": "windows server datacenter edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20080" }, { "model": "web server )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-04" }, { "model": "cosminexus http server linux", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-00-12" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "flex system cmm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.00" }, { "model": "rsa bsafe micro edition suite", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "4.0.3" }, { "model": "project openssl 1.0.0b", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.52" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "11.01" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "web server 01-02-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "http server 12c", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.2" }, { "model": "windows server r2 x64-enterprise", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.11" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.1.2" }, { "model": "windows server gold", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.4.143" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.15" }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "java system application server", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "8.1" }, { "model": "windows xp embedded sp3", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.60" }, { "model": "windows vista ultimate 64-bit edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows server datacenter edition release candidate", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "jdk 0 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2.0-12" }, { "model": "windows server r2 enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20080" }, { "model": "hirdb for java", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.7" }, { "model": "vcenter", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "jre 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "windows xp professional", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.300" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.021" }, { "model": "rational policy tester", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.50" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.51" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.5.146" }, { "model": "nonstop server j06.04.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.3" }, { "model": "windows home premium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "70" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.46" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "windows vista sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ucosminexus primary server base", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.15.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.22" }, { "model": "windows server r2 enterprise edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.205" }, { "model": "windows xp media center edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows starter", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "70" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.07" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.204" }, { "model": "cosminexus http server hp-ux", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-00-13" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "11.10" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "jdk update25", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "java se sr13-fp11", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.4.2" }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "windows server sp2 datacenter", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows server standard edition gold standard", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-" }, { "model": "windows vista home basic sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.103" }, { "model": "windows server standard edition sp2 storage", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-" }, { "model": "jdk 1.6.0 01-b06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.18.1" }, { "model": "web server 02-04-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.71" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "windows server standard edition r2 sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "meeting exchange webportal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "-6.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.91" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.601" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "web server solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-00" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.017" }, { "model": "windows server r2 compute cluster", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.210" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "web server hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-00-01" }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "windows vista ultimate sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.227" }, { "model": "project openssl k", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.309" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.214" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.19.4" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.224" }, { "model": "ucosminexus service platform linux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00(x64)" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.9" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "10" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.11" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "windows server standard edition gold storage", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-" }, { "model": "windows for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "70" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.52" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.8" }, { "model": "nonstop server h06.20.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "cosminexus developer no version", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.0.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.163" }, { "model": "jdk update18", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.304" }, { "model": "windows vista enterprise sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.11" }, { "model": "nonstop server j06.09.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.305" }, { "model": "windows xp professional sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.60" }, { "model": "windows server r2 datacenter edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.13.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.16" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.50" }, { "model": "rsa bsafe micro edition suite", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "3.2.4" }, { "model": "nonstop server h06.18.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "cosminexus application server no version", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "websphere datapower soa appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0.1" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "770.00" }, { "model": "stenberg curl", "scope": "ne", "trust": 0.3, "vendor": "daniel", "version": "7.24.0" }, { "model": "windows server r2 datacenter", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20080" }, { "model": "windows vista home basic 64-bit edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "x64" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "760.10" }, { "model": "project openssl 0.9.8f", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.50" }, { "model": "linux enterprise sdk sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "4.0.1" }, { "model": "windows vista enterprise 64-bit edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.203" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.1" }, { "model": "nonstop server h06.19.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "windows server enterprise edition itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "windows vista home basic", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows vista business 64-bit edition sp1 x86-ultimate", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.7" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "web server aix", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-00" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "freeflow print server 81.d0.73", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.208" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "windows server enterprise edition itanium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "software opera web browser beta3", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.00" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "windows server standard edition sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "nonstop server j06.06.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "cms server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "15.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.12" }, { "model": "jrockit r27.6.2", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.2-77" }, { "model": "ucosminexus application server express", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-70" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.8" }, { "model": "web server", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-00-01" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.2.1" }, { "model": "simatic rf615r", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "3.2.1" }, { "model": "windows vista edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "x64" }, { "model": "windows server gold itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows server datacenter edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "jre 27", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "rational appscan standard", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "windows vista business 64-bit edition sp1 x64-ultimate", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.209" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.226" }, { "model": "windows server standard edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.014" }, { "model": "cosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "nonstop server j06.12.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "windows server enterprise edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "jrockit r27.6.9", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "project openssl 0.9.8r", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "windows server r2 storage", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "power systems 350.a0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "simatic rf68xr", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.1" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.011" }, { "model": "windows vista business 64-bit edition sp1 x64-home premium", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "nonstop server j06.09.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jrockit r27.6.3", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.9" }, { "model": "jdk update14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "cosminexus", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "8.0" }, { "model": "project openssl beta4", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "1.0.0" }, { "model": "java se sr6", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.1" }, { "model": "windows server standard edition gold enterprise", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "project openssl 0.9.8p", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "windows server standard edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "rsa bsafe micro edition suite", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "4.0.2" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "010" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.15-210" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.27" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "messaging application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "windows server r2 sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0.0.95" }, { "model": "windows xp tablet pc edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ucosminexus service platform messaging", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-0" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.18" }, { "model": "networks matrixssl", "scope": "ne", "trust": 0.3, "vendor": "peersec", "version": "3.2.2" }, { "model": "windows server standard edition gold", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008-" }, { "model": "windows server r2 platfom sdk", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows vista ultimate sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "web server", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-00-02" }, { "model": "nonstop server j06.10.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "secure sockets layer", "scope": "eq", "trust": 0.3, "vendor": "ietf", "version": "3.0" }, { "model": "windows ultimate", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "70" }, { "model": "windows server standard edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "rsa bsafe micro edition suite", "scope": "eq", "trust": 0.3, "vendor": "emc", "version": "3.2.5" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "nonstop server h06.24.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.23" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0" }, { "model": "project openssl d", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "windows server r2 standard", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.60" }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "websphere multichannel bank transformation toolkit", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.0.2" }, { "model": "windows vista home basic 64-bit edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "connect build", "scope": "eq", "trust": 0.3, "vendor": "kerio", "version": "7.1.42985" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.10" }, { "model": "web server 02-04-/a (windows(ip", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.19.6" }, { "model": "windows server datacenter edition itanium sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "windows server for x64-based systems sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "virtualcenter update 6b", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.5" }, { "model": "project openssl a", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "simatic rf68xr", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.2" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "jre 1.5.0 09", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "project openssl f", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "cosminexus http server hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00-10" }, { "model": "enterprise linux ws extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.6" }, { "model": "windows xp home", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.10" }, { "model": "windows server web edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser 3win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "enterprise linux es extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openjdk", "scope": "eq", "trust": 0.3, "vendor": "openjdk", "version": "1.6" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.010" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.8" }, { "model": "firefox beta", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.63" }, { "model": "software opera web browser 2win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.64" }, { "model": "windows server itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "8.01" }, { "model": "windows xp service pack", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "30" }, { "model": "nonstop server j06.08.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "freeflow print server 82.d1.44", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2.8" }, { "model": "communication server telephony manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "10003.0" }, { "model": "project openssl 0.9.8l", "scope": null, "trust": 0.3, "vendor": "openssl", "version": null }, { "model": "web server hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-10-09" }, { "model": "windows server r2 datacenter", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows server sp2 compute cluster", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "project openssl h", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "cosminexus developer\u0027s kit for java", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-50-01" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.4" }, { "model": "nonstop server h06.15.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "project openssl i", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "cosminexus primary server base", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "740.21" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.223" }, { "model": "connect", "scope": "ne", "trust": 0.3, "vendor": "kerio", "version": "8.1" }, { "model": "web server hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-00-04" }, { "model": "nonstop server h06.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "simatic rf615r", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.1" }, { "model": "java se sr7", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.20" }, { "model": "java se sr13-fp10", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.4.2" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.63" }, { "model": "windows xp professional edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "x64" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "jdk update16", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "project openssl c", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "windows home premium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "7-x64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.14" }, { "model": "nonstop server h06.22.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "groupware suite", "scope": "ne", "trust": 0.3, "vendor": "collax", "version": "5.5.12" }, { "model": "windows xp professional sp3", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2.106" }, { "model": "jrockit r28.1.3", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "windows vista home basic 64-bit edition sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "x64" }, { "model": "lotus domino", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.12" }, { "model": "windows server enterprise edition release candidate", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.020" }, { "model": "enterprise linux as for sap", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "flex system integrated management module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2" }, { "model": "nonstop server h06.19.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "760.41" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.12.2" }, { "model": "windows vista home basic 64-bit edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.05" }, { "model": "cosminexus", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0" }, { "model": "networks matrixssl", "scope": "eq", "trust": 0.3, "vendor": "peersec", "version": "3.2.1" }, { "model": "websphere multichannel bank transformation toolkit", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "windows for x64-based systems sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "7" }, { "model": "vplex geosynchrony", "scope": "ne", "trust": 0.3, "vendor": "emc", "version": "5.3" }, { "model": "messaging application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "project openssl", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.5" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.16.3" }, { "model": "windows server r2 itanium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "xcode", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.51" }, { "model": "nonstop server h06.21.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.11" }, { "model": "cosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.212" }, { "model": "cosminexus http server", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.206" }, { "model": "cms server aux", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "15.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "cosminexus http server windows", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-00-12" }, { "model": "nonstop server h06.19.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "web server windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-00" }, { "model": "freeflow print server 93.e0.21c", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.10" }, { "model": "simatic rf615r", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.2" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.2" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.9" }, { "model": "cosminexus http server linux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "windows server r2 x64-standard", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "nonstop server j06.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.26.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "linux enterprise server sp1 for sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.43" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.26" }, { "model": "software opera web browser win32 beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "7.02" }, { "model": "access manager sp3", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.1" }, { "model": "ucosminexus developer hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "websphere datapower soa appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.221" }, { "model": "nonstop server j06.04.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.016" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.307" }, { "model": "windows xp", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "jdk 1.5.0 07-b03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "windows server r2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "windows server datacenter edition itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.21" }, { "model": "software opera web browser win32", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "update manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.12.1" }, { "model": "project openssl e", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.8" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "cosminexus http server linux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00-10" }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "5.0" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "350.40" }, { "model": "enterprise linux sap", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "nonstop server h06.20.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.19.5" }, { "model": "software opera web browser beta", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.201" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.21.7" }, { "model": "nonstop server j06.10.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "websphere multichannel bank transformation toolkit", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "ucosminexus application server standard-r", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "9.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.550.0" }, { "model": "windows vista enterprise", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ucosminexus service platform windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00(x64)" }, { "model": "nonstop server h06.16.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software opera web browser linux", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "6.0.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1.3" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "windows server sp2 enterprise", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "jdk update22", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10.61" }, { "model": "software opera web browser", "scope": "eq", "trust": 0.3, "vendor": "opera", "version": "10" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "760.20" }, { "model": "windows xp media center edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "jdk update15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "project openssl beta1", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.7" }, { "model": "communication server telephony manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "10004.0" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.8.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0.2" }, { "model": "power systems", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "730.91" }, { "model": "xcode", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "4.4" }, { "model": "freeflow print server 73.d2.33", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "project openssl m", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "database 11g release", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "111.1.0.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.205" }, { "model": "project openssl b", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.2" }, { "model": "windows server datacenter edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "nonstop server h06.25.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "project openssl j", "scope": "eq", "trust": 0.3, "vendor": "openssl", "version": "0.9.6" }, { "model": "windows server web edition sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" } ], "sources": [ { "db": "CERT/CC", "id": "VU#864643" }, { "db": "BID", "id": "49778" }, { "db": "JVNDB", "id": "JVNDB-2011-002305" }, { "db": "NVD", "id": "CVE-2011-3389" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_rf68xr_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_rf68xr:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_rf615r_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_rf615r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.23.1", "versionStartIncluding": "7.10.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2011-3389" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Thai Duong and Juliano Rizzo, Wendy Parrington from United Utilities.", "sources": [ { "db": "BID", "id": "49778" } ], "trust": 0.3 }, "cve": "CVE-2011-3389", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2011-3389", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2011-3389", "trust": 1.8, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#864643", "trust": 0.8, "value": "3.38" }, { "author": "VULMON", "id": "CVE-2011-3389", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#864643" }, { "db": "VULMON", "id": "CVE-2011-3389" }, { "db": "JVNDB", "id": "JVNDB-2011-002305" }, { "db": "NVD", "id": "CVE-2011-3389" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack. SSL Protocol and TLS The protocol includes CBC There are vulnerabilities that are subject to selective plaintext attacks in mode. SSL Protocol and TLS Protocol is CBC Initialization vector when operating in mode (IV) There is a problem in the determination method, and there is a vulnerability that is subject to selective plaintext attacks. Attack methods using this vulnerability have been released.Encrypted communication is a man-in-the-middle attack (man-in-the-middle attack) If they are intercepted by you, their content may be decrypted. A vulnerability in the specification of the SSL 3.0 and TLS 1.0 protocols could allow an attacker to decrypt encrypted traffic. This will result in a false sense of security, and potentially result in the disclosure of sensitive information. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201111-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Oracle JRE/JDK: Multiple vulnerabilities\n Date: November 05, 2011\n Bugs: #340421, #354213, #370559, #387851\n ID: 201111-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in the Oracle JRE/JDK,\nallowing attackers to cause unspecified impact. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-java/sun-jre-bin \u003c 1.6.0.29 \u003e= 1.6.0.29 *\n 2 app-emulation/emul-linux-x86-java\n \u003c 1.6.0.29 \u003e= 1.6.0.29 *\n 3 dev-java/sun-jdk \u003c 1.6.0.29 \u003e= 1.6.0.29 *\n -------------------------------------------------------------------\n NOTE: Packages marked with asterisks require manual intervention!\n -------------------------------------------------------------------\n 3 affected packages\n -------------------------------------------------------------------\n\nDescription\n===========\n\nMultiple vulnerabilities have been reported in the Oracle Java\nimplementation. Please review the CVE identifiers referenced below and\nthe associated Oracle Critical Patch Update Advisory for details. \n\nImpact\n======\n\nA remote attacker could exploit these vulnerabilities to cause\nunspecified impact, possibly including remote execution of arbitrary\ncode. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Oracle JDK 1.6 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-java/sun-jdk-1.6.0.29\"\n\nAll Oracle JRE 1.6 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-java/sun-jre-bin-1.6.0.29\"\n\nAll users of the precompiled 32-bit Oracle JRE 1.6 should upgrade to\nthe latest version:\n\n # emerge --sync\n # emerge -a -1 -v \"\u003e=app-emulation/emul-linux-x86-java-1.6.0.29\"\n\nNOTE: As Oracle has revoked the DLJ license for its Java\nimplementation, the packages can no longer be updated automatically. \nThis limitation is not present on a non-fetch restricted implementation\nsuch as dev-java/icedtea-bin. \n\nReferences\n==========\n\n[ 1 ] CVE-2010-3541\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541\n[ 2 ] CVE-2010-3548\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548\n[ 3 ] CVE-2010-3549\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549\n[ 4 ] CVE-2010-3550\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3550\n[ 5 ] CVE-2010-3551\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551\n[ 6 ] CVE-2010-3552\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3552\n[ 7 ] CVE-2010-3553\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553\n[ 8 ] CVE-2010-3554\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554\n[ 9 ] CVE-2010-3555\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3555\n[ 10 ] CVE-2010-3556\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3556\n[ 11 ] CVE-2010-3557\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557\n[ 12 ] CVE-2010-3558\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3558\n[ 13 ] CVE-2010-3559\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3559\n[ 14 ] CVE-2010-3560\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3560\n[ 15 ] CVE-2010-3561\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561\n[ 16 ] CVE-2010-3562\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562\n[ 17 ] CVE-2010-3563\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3563\n[ 18 ] CVE-2010-3565\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565\n[ 19 ] CVE-2010-3566\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566\n[ 20 ] CVE-2010-3567\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567\n[ 21 ] CVE-2010-3568\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568\n[ 22 ] CVE-2010-3569\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569\n[ 23 ] CVE-2010-3570\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3570\n[ 24 ] CVE-2010-3571\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3571\n[ 25 ] CVE-2010-3572\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3572\n[ 26 ] CVE-2010-3573\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573\n[ 27 ] CVE-2010-3574\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574\n[ 28 ] CVE-2010-4422\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4422\n[ 29 ] CVE-2010-4447\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4447\n[ 30 ] CVE-2010-4448\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448\n[ 31 ] CVE-2010-4450\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450\n[ 32 ] CVE-2010-4451\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4451\n[ 33 ] CVE-2010-4452\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4452\n[ 34 ] CVE-2010-4454\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4454\n[ 35 ] CVE-2010-4462\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4462\n[ 36 ] CVE-2010-4463\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4463\n[ 37 ] CVE-2010-4465\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465\n[ 38 ] CVE-2010-4466\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4466\n[ 39 ] CVE-2010-4467\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467\n[ 40 ] CVE-2010-4468\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4468\n[ 41 ] CVE-2010-4469\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469\n[ 42 ] CVE-2010-4470\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470\n[ 43 ] CVE-2010-4471\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471\n[ 44 ] CVE-2010-4472\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472\n[ 45 ] CVE-2010-4473\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4473\n[ 46 ] CVE-2010-4474\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4474\n[ 47 ] CVE-2010-4475\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4475\n[ 48 ] CVE-2010-4476\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476\n[ 49 ] CVE-2011-0802\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0802\n[ 50 ] CVE-2011-0814\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0814\n[ 51 ] CVE-2011-0815\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815\n[ 52 ] CVE-2011-0862\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862\n[ 53 ] CVE-2011-0863\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0863\n[ 54 ] CVE-2011-0864\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864\n[ 55 ] CVE-2011-0865\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865\n[ 56 ] CVE-2011-0867\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0867\n[ 57 ] CVE-2011-0868\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868\n[ 58 ] CVE-2011-0869\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869\n[ 59 ] CVE-2011-0871\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871\n[ 60 ] CVE-2011-0872\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872\n[ 61 ] CVE-2011-0873\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0873\n[ 62 ] CVE-2011-3389\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389\n[ 63 ] CVE-2011-3516\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3516\n[ 64 ] CVE-2011-3521\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521\n[ 65 ] CVE-2011-3544\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544\n[ 66 ] CVE-2011-3545\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3545\n[ 67 ] CVE-2011-3546\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3546\n[ 68 ] CVE-2011-3547\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547\n[ 69 ] CVE-2011-3548\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548\n[ 70 ] CVE-2011-3549\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3549\n[ 71 ] CVE-2011-3550\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3550\n[ 72 ] CVE-2011-3551\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551\n[ 73 ] CVE-2011-3552\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552\n[ 74 ] CVE-2011-3553\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553\n[ 75 ] CVE-2011-3554\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554\n[ 76 ] CVE-2011-3555\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3555\n[ 77 ] CVE-2011-3556\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556\n[ 78 ] CVE-2011-3557\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557\n[ 79 ] CVE-2011-3558\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558\n[ 80 ] CVE-2011-3560\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560\n[ 81 ] CVE-2011-3561\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3561\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201111-02.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. ----------------------------------------------------------------------\n\nOvum says ad hoc tools are out-dated. The best practice approach?\nFast vulnerability intelligence, threat handling, and setup in one tool. \n\nRead the new report on the Secunia VIM:\nhttp://secunia.com/products/corporate/vim/ovum_2011_request/ \n\n----------------------------------------------------------------------\n\nTITLE:\nHitachi Cosminexus Products Java Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA46694\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/46694/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46694\n\nRELEASE DATE:\n2011-11-08\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/46694/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/46694/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46694\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nHitachi has acknowledged multiple vulnerabilities in Hitachi\nCosminexus products, which can be exploited by malicious users to\ndisclose certain information and by malicious people to disclose\npotentially sensitive information, hijack a user\u0027s session, conduct\nDNS cache poisoning attacks, manipulate certain data, cause a DoS\n(Denial of Service), and compromise a vulnerable system. \n\nThe vulnerabilities are caused due to vulnerabilities in the bundled\nversion of Cosminexus Developer\u0027s Kit for Java. \n\nFor more information:\nSA46512\n\nPlease see the vendor\u0027s advisory for a list of affected products. Please see the vendor\u0027s advisory for\ndetails. \n\nORIGINAL ADVISORY:\nhttp://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-024/index.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \nHP System Management Homepage (SMH) v7.2.0 and earlier running on Linux and\nWindows. This combines the two previous\nopenjdk-6 advisories, DSA-2311-1 and DSA-2356-1. \n\nCVE-2011-0862\n\tInteger overflow errors in the JPEG and font parser allow\n\tuntrusted code (including applets) to elevate its privileges. \n\nCVE-2011-0864\n\tHotspot, the just-in-time compiler in OpenJDK, mishandled\n\tcertain byte code instructions, allowing untrusted code\n\t(including applets) to crash the virtual machine. \n\nCVE-2011-0865\n\tA race condition in signed object deserialization could\n\tallow untrusted code to modify signed content, apparently\n\tleaving its signature intact. \n\nCVE-2011-0867\n\tUntrusted code (including applets) could access information\n\tabout network interfaces which was not intended to be public. \n\t(Note that the interface MAC address is still available to\n\tuntrusted code.)\n\nCVE-2011-0868\n\tA float-to-long conversion could overflow, , allowing\n\tuntrusted code (including applets) to crash the virtual\n\tmachine. \n\nCVE-2011-0869\n\tUntrusted code (including applets) could intercept HTTP\n\trequests by reconfiguring proxy settings through a SOAP\n\tconnection. \n\nCVE-2011-0871\n\tUntrusted code (including applets) could elevate its\n\tprivileges through the Swing MediaTracker code. \n\nCVE-2011-3521\n\tThe CORBA implementation contains a deserialization\n\tvulnerability in the IIOP implementation, allowing untrusted\n\tJava code (such as applets) to elevate its privileges. \n\nCVE-2011-3544\n\tThe Java scripting engine lacks necessary security manager\n\tchecks, allowing untrusted Java code (such as applets) to\n\televate its privileges. \n\nCVE-2011-3547\n\tThe skip() method in java.io.InputStream uses a shared buffer,\n\tallowing untrusted Java code (such as applets) to access data\n\tthat is skipped by other code. \n\nCVE-2011-3553\n\tJAX-WS enables stack traces for certain server responses by\n\tdefault, potentially leaking sensitive information. \n\nFor the oldstable distribution (lenny), these problems have been fixed\nin version 6b18-1.8.10-0~lenny1. \nThe complete list of recognized system roots may be viewed via the\nKeychain Access application. \nCVE-ID\nCVE-2014-1263 : Roland Moriz of Moriz GmbH\n\nData Security\nAvailable for: OS X Mavericks 10.9 and 10.9.1\nImpact: An attacker with a privileged network position may capture\nor modify data in sessions protected by SSL/TLS\nDescription: Secure Transport failed to validate the authenticity of\nthe connection. \nCVE-ID\nCVE-2014-1259\n\nFinder\nAvailable for: OS X Mavericks 10.9 and 10.9.1\nImpact: Accessing a file\u0027s ACL via Finder may lead to other users\ngaining unauthorized access to files\nDescription: Accessing a file\u0027s ACL via Finder may corrupt the ACLs\non the file. \nThe issue was addressed by filtering unsafe unicode characters from\ndisplay in filenames. Downloading a maliciously crafted\nMicrosoft Office file may have led to an unexpected application\ntermination or arbitrary code execution. \nTo address these issues for applications using Secure Transport, the\n1-byte fragment mitigation was enabled by default for this\nconfiguration. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2013:037\n http://www.mandriva.com/en/support/security/\n _______________________________________________________________________\n\n Package : fetchmail\n Date : April 5, 2013\n Affected: Business Server 1.0\n _______________________________________________________________________\n\n Problem Description:\n\n Multiple vulnerabilities has been found and corrected in fetchmail:\n \n Fetchmail version 6.3.9 enabled all SSL workarounds (SSL_OP_ALL) which\n contains a switch to disable a countermeasure against certain attacks\n against block ciphers that permit guessing the initialization vectors,\n providing that an attacker can make the application (fetchmail) encrypt\n some data for him -- which is not easily the case (aka a BEAST attack)\n (CVE-2011-3389). \n \n A denial of service flaw was found in the way Fetchmail, a remote mail\n retrieval and forwarding utility, performed base64 decoding of certain\n NTLM server responses. Upon sending the NTLM authentication request,\n Fetchmail did not check if the received response was actually part\n of NTLM protocol exchange, or server-side error message and session\n abort. \n \n This advisory provides the latest version of fetchmail (6.3.22)\n which is not vulnerable to these issues. The verification\n of md5 checksums and GPG signatures is performed automatically for you. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2012-09-19-2 OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and\nSecurity Update 2012-004\n\nOS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update\n2012-004 are now available and address the following:\n\nApache\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4\nImpact: Multiple vulnerabilities in Apache\nDescription: Apache is updated to version 2.2.22 to address several\nvulnerabilities, the most serious of which may lead to a denial of\nservice. Further information is available via the Apache web site at\nhttp://httpd.apache.org/. This issue does not affect OS X Mountain\nLion systems. \nCVE-ID\nCVE-2011-3368\nCVE-2011-3607\nCVE-2011-4317\nCVE-2012-0021\nCVE-2012-0031\nCVE-2012-0053\n\nBIND\nAvailable for: OS X Lion v10.7 to v10.7.4,\nOS X Lion Server v10.7 to v10.7.4\nImpact: A remote attacker may be able to cause a denial of service\nin systems configured to run BIND as a DNS nameserver\nDescription: A reachable assertion issue existed in the handling of\nDNS records. This issue was addressed by updating to BIND 9.7.6-P1. \nThis issue does not affect OS X Mountain Lion systems. \nCVE-ID\nCVE-2011-4313\n\nBIND\nAvailable for: OS X Lion v10.7 to v10.7.4,\nOS X Lion Server v10.7 to v10.7.4,\nOS X Mountain Lion v10.8 and v10.8.1\nImpact: A remote attacker may be able to cause a denial of service,\ndata corruption, or obtain sensitive information from process memory\nin systems configured to run BIND as a DNS nameserver\nDescription: A memory management issue existed in the handling of\nDNS records. This issue was addressed by updating to BIND 9.7.6-P1 on\nOS X Lion systems, and BIND 9.8.3-P1 on OS X Mountain Lion systems. \nCVE-ID\nCVE-2012-1667\n\nCoreText\nAvailable for: OS X Lion v10.7 to v10.7.4,\nOS X Lion Server v10.7 to v10.7.4\nImpact: Applications that use CoreText may be vulnerable to an\nunexpected application termination or arbitrary code execution\nDescription: A bounds checking issue existed in the handling of text\nglyphs, which may lead to out of bounds memory reads or writes. This\nissue was addressed through improved bounds checking. This issue does\nnot affect Mac OS X v10.6 or OS X Mountain Lion systems. \nCVE-ID\nCVE-2012-3716 : Jesse Ruderman of Mozilla Corporation\n\nData Security\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4,\nOS X Mountain Lion v10.8 and v10.8.1\nImpact: An attacker with a privileged network position may intercept\nuser credentials or other sensitive information\nDescription: TrustWave, a trusted root CA, has issued, and\nsubsequently revoked, a sub-CA certificate from one of its trusted\nanchors. This sub-CA facilitated the interception of communications\nsecured by Transport Layer Security (TLS). This update adds the\ninvolved sub-CA certificate to OS X\u0027s list of untrusted certificates. \n\nDirectoryService\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8\nImpact: If the DirectoryService Proxy is used, a remote attacker may\ncause a denial of service or arbitrary code execution\nDescription: A buffer overflow existed in the DirectoryService\nProxy. This issue was addressed through improved bounds checking. \nThis issue does not affect OS X Lion and Mountain Lion systems. \nCVE-ID\nCVE-2012-0650 : aazubel working with HP\u0027s Zero Day Initiative\n\nImageIO\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4\nImpact: Viewing a maliciously crafted PNG image may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues existed in libpng\u0027s\nhandling of PNG images. These issues were addressed through improved\nvalidation of PNG images. These issues do not affect OS X Mountain\nLion systems. \nCVE-ID\nCVE-2011-3026 : Juri Aedla\nCVE-2011-3048\n\nImageIO\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4\nImpact: Viewing a maliciously crafted TIFF image may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An integer overflow issue existed in libTIFF\u0027s handling\nof TIFF images. This issue was addressed through improved validation\nof TIFF images. This issue does not affect OS X Mountain Lion\nsystems. \nCVE-ID\nCVE-2012-1173 : Alexander Gavrun working with HP\u0027s Zero Day\nInitiative\n\nInstaller\nAvailable for: OS X Lion v10.7 to v10.7.4,\nOS X Lion Server v10.7 to v10.7.4\nImpact: Remote admins and persons with physical access to the system\nmay obtain account information\nDescription: The fix for CVE-2012-0652 in OS X Lion 10.7.4 prevented\nuser passwords from being recorded in the system log, but did not\nremove the old log entries. This issue was addressed by deleting log\nfiles that contained passwords. This issue does not affect Mac OS X\n10.6 or OS X Mountain Lion systems. \nCVE-ID\nCVE-2012-0652\n\nInternational Components for Unicode\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4\nImpact: Applications that use ICU may be vulnerable to an unexpected\napplication termination or arbitrary code execution\nDescription: A stack buffer overflow existed in the handling of ICU\nlocale IDs. This issue was addressed through improved bounds\nchecking. This issue does not affect OS X Mountain Lion systems. \nCVE-ID\nCVE-2011-4599\n\nKernel\nAvailable for: OS X Lion v10.7 to v10.7.4,\nOS X Lion Server v10.7 to v10.7.4\nImpact: A malicious program could bypass sandbox restrictions\nDescription: A logic issue existed in the handling of debug system\ncalls. This may allow a malicious program to gain code execution in\nother programs with the same user privileges. This issue was\naddressed by disabling handling of addresses in PT_STEP and\nPT_CONTINUE. This issue does not affect OS X Mountain Lion systems. \nCVE-ID\nCVE-2012-0643 : iOS Jailbreak Dream Team\n\nLoginWindow\nAvailable for: OS X Mountain Lion v10.8 and v10.8.1\nImpact: A local user may be able to obtain other user\u0027s login\npasswords\nDescription: A user-installed input method could intercept password\nkeystrokes from Login Window or Screen Saver Unlock. This issue was\naddressed by preventing user-installed methods from being used when\nthe system is handling login information. \nCVE-ID\nCVE-2012-3718 : An anonymous researcher\n\nMail\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4\nImpact: Viewing an e-mail message may lead to execution of web\nplugins\nDescription: An input validation issue existed in Mail\u0027s handling of\nembedded web plugins. This issue was addressed by disabling third-\nparty plug-ins in Mail. This issue does not affect OS X Mountain Lion\nsystems. \nCVE-ID\nCVE-2012-3719 : Will Dormann of the CERT/CC\n\nMobile Accounts\nAvailable for: OS X Mountain Lion v10.8 and v10.8.1\nImpact: A user with access to the contents of a mobile account may\nobtain the account password\nDescription: Creating a mobile account saved a hash of the password\nin the account, which was used to login when the mobile account was\nused as an external account. The password hash could be used to\ndetermine the user\u0027s password. This issue was addressed by creating\nthe password hash only if external accounts are enabled on the system\nwhere the mobile account is created. \nCVE-ID\nCVE-2012-3720 : Harald Wagener of Google, Inc. \n\nPHP\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4,\nOS X Mountain Lion v10.8 and v10.8.1\nImpact: Multiple vulnerabilities in PHP\nDescription: \u003ePHP is updated to version 5.3.15 to address multiple\nvulnerabilities, the most serious of which may lead to arbitrary code\nexecution. Further information is available via the PHP web site at\nhttp://www.php.net\nCVE-ID\nCVE-2012-0831\nCVE-2012-1172\nCVE-2012-1823\nCVE-2012-2143\nCVE-2012-2311\nCVE-2012-2386\nCVE-2012-2688\n\nPHP\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4\nImpact: PHP scripts which use libpng may be vulnerable to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the handling of\nPNG files. This issue was addressed by updating PHP\u0027s copy of libpng\nto version 1.5.10. This issue does not affect OS X Mountain Lion\nsystems. \nCVE-ID\nCVE-2011-3048\n\nProfile Manager\nAvailable for: OS X Lion Server v10.7 to v10.7.4\nImpact: An unauthenticated user could enumerate managed devices\nDescription: An authentication issue existed in the Device\nManagement private interface. This issue was addressed by removing\nthe interface. This issue does not affect OS X Mountain Lion\nsystems. \nCVE-ID\nCVE-2012-3721 : Derick Cassidy of XEquals Corporation\n\nQuickLook\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4\nImpact: Viewing a maliciously crafted .pict file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the handling of\n.pict files. This issue was addressed through improved validation of\n.pict files. This issue does not affect OS X Mountain Lion systems. \nCVE-ID\nCVE-2012-0671 : Rodrigo Rubira Branco (twitter.com/bsdaemon) from the\nQualys Vulnerability \u0026 Malware Research Labs (VMRL)\n\nQuickTime\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An integer overflow existed in QuickTime\u0027s handling of\nsean atoms. This issue was addressed through improved bounds\nchecking. This issue does not affect OS X Mountain Lion systems. \nCVE-ID\nCVE-2012-0670 : Tom Gallagher (Microsoft) and Paul Bates (Microsoft)\nworking with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An uninitialized memory access existed in the handling\nof Sorenson encoded movie files. This issue was addressed through\nimproved memory initialization. This issue does not affect OS X\nMountain Lion systems. \nCVE-ID\nCVE-2012-3722 : Will Dormann of the CERT/CC\n\nQuickTime\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of RLE\nencoded movie files. This issue was addressed through improved bounds\nchecking. This issue does not affect OS X Mountain Lion systems. \nCVE-ID\nCVE-2012-0668 : Luigi Auriemma working with HP\u0027s Zero Day Initiative\n\nRuby\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.4, OS X Lion Server v10.7 to v10.7.4\nImpact: An attacker may be able to decrypt data protected by SSL\nDescription: There are known attacks on the confidentiality of SSL\n3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. \nThe Ruby OpenSSL module disabled the \u0027empty fragment\u0027 countermeasure\nwhich prevented these attacks. This issue was addressed by enabling\nempty fragments. This issue does not affect OS X Mountain Lion\nsystems. \nCVE-ID\nCVE-2011-3389\n\nUSB\nAvailable for: OS X Lion v10.7 to v10.7.4,\nOS X Lion Server v10.7 to v10.7.4\nImpact: Attaching a USB device may lead to an unexpected system\ntermination or arbitrary code execution\nDescription: A memory corruption issue existed in the handling of\nUSB hub descriptors. This issue was addressed through improved\nhandling of the bNbrPorts descriptor field. This issue does not\naffect OS X Mountain Lion systems. \nCVE-ID\nCVE-2012-3723 : Andy Davis of NGS Secure\n\nNote: OS X Mountain Lion v10.8.2 includes the content of\nSafari 6.0.1. For further details see \"About the security content\nof Safari 6.0.1\" at http://http//support.apple.com/kb/HT5502\n\n\nOS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update\n2012-004 may be obtained from the Software Update pane in System\nPreferences, or Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nThe Software Update utility will present the update that applies\nto your system configuration. Only one is needed, either\nOS X Mountain Lion v10.8.2, OS X Lion v10.7.5 or Security Update\n2012-004. \n\nFor OS X Mountain Lion v10.8.1\nThe download file is named: OSXUpd10.8.2.dmg\nIts SHA-1 digest is: d6779e1cc748b78af0207499383b1859ffbebe33\n\nFor OS X Mountain Lion v10.8\nThe download file is named: OSXUpdCombo10.8.2.dmg\nIts SHA-1 digest is: b08f10233d362e39f20b69f91d1d73f5e7b68a2c\n\nFor OS X Lion v10.7.4\nThe download file is named: MacOSXUpd10.7.5.dmg\nIts SHA-1 digest is: e0a9582cce9896938a7a541bd431862d93893532\n\nFor OS X Lion v10.7 and v10.7.3\nThe download file is named: MacOSXUpdCombo10.7.5.dmg\nIts SHA-1 digest is: f7a26b164fa10dae4fe646e57b01c34a619c8d9b\n\nFor OS X Lion Server v10.7.4\nThe download file is named: MacOSXServerUpd10.7.5.dmg\nIts SHA-1 digest is: a891b03bfb4eecb745c0c39a32f39960fdb6796a\n\nFor OS X Lion Server v10.7 and v10.7.3\nThe download file is named: MacOSXServerUpdCombo10.7.5.dmg\nIts SHA-1 digest is: df6e1748ab0a3c9e05c890be49d514673efd965e\n\nFor Mac OS X v10.6.8\nThe download file is named: SecUpd2012-004.dmg\nIts SHA-1 digest is: 5b136e29a871d41012f0c6ea1362d6210c8b4fb7\n\nFor Mac OS X Server v10.6.8\nThe download file is named: SecUpdSrvr2012-004.dmg\nIts SHA-1 digest is: 9b24496be15078e58a88537700f2f39c112e3b28\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.17 (Darwin)\nComment: GPGTools - http://gpgtools.org\n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\nxyBfrQfG/dsif6jGHaot\n=8joH\n-----END PGP SIGNATURE-----\n. \n\nRelease Date: 2012-05-15\nLast Updated: 2012-05-15\n\n- -----------------------------------------------------------------------------\n\nPotential Security Impact: Remote Denial of service, unauthorized\nmodification and disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified in Java Runtime\nEnvironment (JRE) and Java Developer Kit (JDK) running on HP-UX. These\nvulnerabilities may allow remote Denial of Service (DoS), unauthorized\nmodification and disclosure of information. \n\nReferences: CVE-2010-4447, CVE-2010-4448, CVE-2010-4454, CVE-2010-4462,\nCVE-2010-4465, CVE-2010-4469, CVE-2010-4473, CVE-2010-4475, CVE-2010-4476,\nCVE-2011-0802, CVE-2011-0814, CVE-2011-0815, CVE-2011-0862, CVE-2011-0864,\nCVE-2011-0865, CVE-2011-0867, CVE-2011-0871, CVE-2011-3389, CVE-2011-3545,\nCVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560, CVE-2011-3563, CVE-2012-0499, CVE-2012-0502,\nCVE-2012-0503, CVE-2012-0505, CVE-2012-0506\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2010-4447 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2010-4448 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6\nCVE-2010-4454 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2010-4462 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2010-4465 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2010-4469 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2010-4473 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2010-4475 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2010-4476 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-0802 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2011-0814 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2011-0815 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2011-0862 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2011-0864 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2011-0865 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6\nCVE-2011-0867 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2011-0871 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2011-3389 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2011-3545 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2011-3547 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2011-3548 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2011-3549 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2011-3552 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6\nCVE-2011-3556 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2011-3557 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2011-3560 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4\nCVE-2011-3563 (AV:N/AC:L/Au:N/C:P/I:N/A:P) 6.4\nCVE-2012-0499 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2012-0502 (AV:N/AC:L/Au:N/C:P/I:N/A:P) 6.4\nCVE-2012-0503 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2012-0505 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2012-0506 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP is providing the following Java updates to resolve the vulnerabilities. \nThe updates are available from: http://www.hp.com/go/java\n\nThese issues are addressed in the following versions of the HP Java:\n\nHP-UX B.11.11 / SDK and JRE v1.4.2.28 or subsequent\n\nHP-UX B.11.23 / SDK and JRE v1.4.2.28 or subsequent\n\nHP-UX B.11.31 / SDK and JRE v1.4.2.28 or subsequent\n\nMANUAL ACTIONS: Yes - Update\n\nFor Java v1.4.2.27 and earlier, update to Java v1.4.2.28 or subsequent. \n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant:\nHP-UX Software Assistant is an enhanced application that replaces HP-UX\nSecurity Patch Check. It analyzes all HP-issued Security Bulletins and lists\nrecommended actions that may apply to a specific HP-UX system. It can also\ndownload patches and create a depot automatically. For more information see:\nhttps://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.11\nHP-UX B.11.23\nHP-UX B.11.31\n===========\nJpi14.JPI14-COM\nJpi14.JPI14-COM-DOC\nJpi14.JPI14-IPF32\nJpi14.JPI14-PA11\nJdk14.JDK14-COM\nJdk14.JDK14-DEMO\nJdk14.JDK14-IPF32\nJdk14.JDK14-IPF64\nJdk14.JDK14-PA11\nJdk14.JDK14-PA20\nJdk14.JDK14-PA20W\nJdk14.JDK14-PNV2\nJdk14.JDK14-PWV2\nJre14.JRE14-COM\nJre14.JRE14-COM-DOC\nJre14.JRE14-IPF32\nJre14.JRE14-IPF32-HS\nJre14.JRE14-IPF64\nJre14.JRE14-IPF64-HS\nJre14.JRE14-PA11\nJre14.JRE14-PA11-HS\nJre14.JRE14-PA20\nJre14.JRE14-PA20-HS\nJre14.JRE14-PA20W\nJre14.JRE14-PA20W-HS\nJre14.JRE14-PNV2\nJre14.JRE14-PNV2-H\nJre14.JRE14-PWV2\nJre14.JRE14-PWV2-H\naction: install revision 1.4.2.28.00 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 15 May 2012 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated\nperiodically, is contained in HP Security Notice HPSN-2011-001:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttp://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: java-1.6.0-openjdk security update\nAdvisory ID: RHSA-2011:1380-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2011-1380.html\nIssue date: 2011-10-18\nCVE Names: CVE-2011-3389 CVE-2011-3521 CVE-2011-3544 \n CVE-2011-3547 CVE-2011-3548 CVE-2011-3551 \n CVE-2011-3552 CVE-2011-3553 CVE-2011-3554 \n CVE-2011-3556 CVE-2011-3557 CVE-2011-3558 \n CVE-2011-3560 \n=====================================================================\n\n1. Summary:\n\nUpdated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5 and 6. \n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5 server) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nThese packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit. \n\nA flaw was found in the Java RMI (Remote Method Invocation) registry\nimplementation. A remote RMI client could use this flaw to execute\narbitrary code on the RMI server running the registry. (CVE-2011-3556)\n\nA flaw was found in the Java RMI registry implementation. A remote RMI\nclient could use this flaw to execute code on the RMI server with\nunrestricted privileges. (CVE-2011-3557)\n\nA flaw was found in the IIOP (Internet Inter-Orb Protocol) deserialization\ncode. An untrusted Java application or applet running in a sandbox could\nuse this flaw to bypass sandbox restrictions by deserializing\nspecially-crafted input. (CVE-2011-3521)\n\nIt was found that the Java ScriptingEngine did not properly restrict the\nprivileges of sandboxed applications. An untrusted Java application or\napplet running in a sandbox could use this flaw to bypass sandbox\nrestrictions. (CVE-2011-3544)\n\nA flaw was found in the AWTKeyStroke implementation. An untrusted Java\napplication or applet running in a sandbox could use this flaw to bypass\nsandbox restrictions. (CVE-2011-3548)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the Java2D code used to perform transformations of graphic shapes\nand images. An untrusted Java application or applet running in a sandbox\ncould use this flaw to bypass sandbox restrictions. (CVE-2011-3551)\n\nAn insufficient error checking flaw was found in the unpacker for JAR files\nin pack200 format. A specially-crafted JAR file could use this flaw to\ncrash the Java Virtual Machine (JVM) or, possibly, execute arbitrary code\nwith JVM privileges. (CVE-2011-3554)\n\nIt was found that HttpsURLConnection did not perform SecurityManager checks\nin the setSSLSocketFactory method. An untrusted Java application or applet\nrunning in a sandbox could use this flaw to bypass connection restrictions\ndefined in the policy. An attacker able to perform a\nchosen plain text attack against a connection mixing trusted and untrusted\ndata could use this flaw to recover portions of the trusted data sent over\nthe connection. (CVE-2011-3389)\n\nNote: This update mitigates the CVE-2011-3389 issue by splitting the first\napplication data record byte to a separate SSL/TLS protocol record. This\nmitigation may cause compatibility issues with some SSL/TLS implementations\nand can be disabled using the jsse.enableCBCProtection boolean property. \nThis can be done on the command line by appending the flag\n\"-Djsse.enableCBCProtection=false\" to the java command. \n\nAn information leak flaw was found in the InputStream.skip implementation. \nAn untrusted Java application or applet could possibly use this flaw to\nobtain bytes skipped by other threads. (CVE-2011-3547)\n\nA flaw was found in the Java HotSpot virtual machine. An untrusted Java\napplication or applet could use this flaw to disclose portions of the VM\nmemory, or cause it to crash. (CVE-2011-3558)\n\nThe Java API for XML Web Services (JAX-WS) implementation in OpenJDK was\nconfigured to include the stack trace in error messages sent to clients. A\nremote client could possibly use this flaw to obtain sensitive information. \n(CVE-2011-3553)\n\nIt was found that Java applications running with SecurityManager\nrestrictions were allowed to use too many UDP sockets by default. If\nmultiple instances of a malicious application were started at the same\ntime, they could exhaust all available UDP sockets on the system. \n(CVE-2011-3552)\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.9.10. Refer to\nthe NEWS file, linked to in the References, for further information. \n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n737506 - CVE-2011-3389 HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)\n745379 - CVE-2011-3560 OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)\n745387 - CVE-2011-3547 OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)\n745391 - CVE-2011-3551 OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)\n745397 - CVE-2011-3552 OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)\n745399 - CVE-2011-3544 OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)\n745442 - CVE-2011-3521 OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)\n745447 - CVE-2011-3554 OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)\n745459 - CVE-2011-3556 OpenJDK: RMI DGC server remote code execution (RMI, 7077466)\n745464 - CVE-2011-3557 OpenJDK: RMI registry privileged code execution (RMI, 7083012)\n745473 - CVE-2011-3548 OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)\n745476 - CVE-2011-3553 OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)\n745492 - CVE-2011-3558 OpenJDK: Hotspot unspecified issue (Hotspot, 7070134)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.i386.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.el5_7.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm\n\ni386:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.i686.rpm\n\nx86_64:\njava-1.6.0-openjdk-debuginfo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\njava-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-3389.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3521.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3544.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3547.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3548.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3551.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3552.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3553.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3554.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3556.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3557.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3558.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3560.html\nhttps://access.redhat.com/security/updates/classification/#critical\nhttp://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html\nhttp://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/NEWS\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFOngvzXlSAg2UNWIIRArb8AKCaS923HYBco1E2eOOedT1aefjmyACgherU\n1E1DMZpv3ExBmKhD4Emi2no=\n=sMXo\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nCVE-2011-4362\n\n Xi Wang discovered that the base64 decoding routine which is used to\n decode user input during an HTTP authentication, suffers of a signedness\n issue when processing user input. As a result it is possible to force\n lighttpd to perform an out-of-bounds read which results in Denial of\n Service conditions. \n\nCVE-2011-3389\n\n When using CBC ciphers on an SSL enabled virtual host to communicate with\n certain client, a so called \"BEAST\" attack allows man-in-the-middle\n attackers to obtain plaintext HTTP traffic via a blockwise\n chosen-boundary attack (BCBA) on an HTTPS session. Technically this is\n no lighttpd vulnerability. However, lighttpd offers a workaround to\n mitigate this problem by providing a possibility to disable CBC ciphers. \n\n This updates includes this option by default. System administrators\n are advised to read the NEWS file of this update (as this may break older\n clients)", "sources": [ { "db": "NVD", "id": "CVE-2011-3389" }, { "db": "JVNDB", "id": "JVNDB-2011-002305" }, { "db": "CERT/CC", "id": "VU#864643" }, { "db": "BID", "id": "49778" }, { "db": "PACKETSTORM", "id": "106640" }, { "db": "PACKETSTORM", "id": "106747" }, { "db": "PACKETSTORM", "id": "122468" }, { "db": "PACKETSTORM", "id": "108800" }, { "db": "VULMON", "id": "CVE-2011-3389" }, { "db": "PACKETSTORM", "id": "107532" }, { "db": "PACKETSTORM", "id": "125427" }, { "db": "PACKETSTORM", "id": "108498" }, { "db": "PACKETSTORM", "id": "121097" }, { "db": "PACKETSTORM", "id": "116792" }, { "db": "PACKETSTORM", "id": "112826" }, { "db": "PACKETSTORM", "id": "105967" }, { "db": "PACKETSTORM", "id": "108077" } ], "trust": 3.78 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-3389", "trust": 3.3 }, { "db": "CERT/CC", "id": "VU#864643", "trust": 2.9 }, { "db": "ICS CERT", "id": "ICSMA-18-058-02", "trust": 1.8 }, { "db": "USCERT", "id": "TA12-010A", "trust": 1.8 }, { "db": "SIEMENS", "id": "SSA-556833", "trust": 1.3 }, { "db": "BID", "id": "49778", "trust": 1.3 }, { "db": "ICS CERT", "id": "ICSA-19-192-04", "trust": 1.1 }, { "db": "SECUNIA", "id": "48948", "trust": 1.0 }, { "db": "SECUNIA", "id": "55322", "trust": 1.0 }, { "db": "SECUNIA", "id": "48692", "trust": 1.0 }, { "db": "SECUNIA", "id": "47998", "trust": 1.0 }, { "db": "SECUNIA", "id": "55350", "trust": 1.0 }, { "db": "SECUNIA", "id": "49198", "trust": 1.0 }, { "db": "SECUNIA", "id": "48915", "trust": 1.0 }, { "db": "SECUNIA", "id": "48256", "trust": 1.0 }, { "db": "SECUNIA", "id": "55351", "trust": 1.0 }, { "db": "SECUNIA", "id": "45791", "trust": 1.0 }, { "db": "BID", "id": "49388", "trust": 1.0 }, { "db": "SECTRACK", "id": "1026103", "trust": 1.0 }, { "db": "SECTRACK", "id": "1029190", "trust": 1.0 }, { "db": "SECTRACK", "id": "1026704", "trust": 1.0 }, { "db": "SECTRACK", "id": "1025997", "trust": 1.0 }, { "db": "OSVDB", "id": "74829", "trust": 1.0 }, { "db": "JVN", "id": "JVNVU95174988", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU95868425", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-14-098-03", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-002305", "trust": 0.8 }, { "db": "HITACHI", "id": "HS11-024", "trust": 0.4 }, { "db": "HITACHI", "id": "HS14-011", "trust": 0.3 }, { "db": "HITACHI", "id": "HS13-018", "trust": 0.3 }, { "db": "XF", "id": "70069", "trust": 0.3 }, { "db": "SECUNIA", "id": "46694", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2011-3389", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "106640", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "106747", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "122468", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108800", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108077", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "107532", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "125427", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108498", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121097", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116792", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112826", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "105967", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#864643" }, { "db": "VULMON", "id": "CVE-2011-3389" }, { "db": "BID", "id": "49778" }, { "db": "JVNDB", "id": "JVNDB-2011-002305" }, { "db": "PACKETSTORM", "id": "106640" }, { "db": "PACKETSTORM", "id": "106747" }, { "db": "PACKETSTORM", "id": "122468" }, { "db": "PACKETSTORM", "id": "108800" }, { "db": "PACKETSTORM", "id": "108077" }, { "db": "PACKETSTORM", "id": "107532" }, { "db": "PACKETSTORM", "id": "125427" }, { "db": "PACKETSTORM", "id": "108498" }, { "db": "PACKETSTORM", "id": "121097" }, { "db": "PACKETSTORM", "id": "116792" }, { "db": "PACKETSTORM", "id": "112826" }, { "db": "PACKETSTORM", "id": "105967" }, { "db": "NVD", "id": "CVE-2011-3389" } ] }, "id": "VAR-201109-0130", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25529101000000004 }, "last_update_date": "2024-06-17T10:34:10.800000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2013-10-22-3 ", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2013/oct/msg00004.html" }, { "title": "APPLE-SA-2012-07-25-2 Xcode 4.4", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2012/jul/msg00001.html" }, { "title": "APPLE-SA-2012-09-19-2", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2012/sep/msg00004.html" }, { "title": "APPLE-SA-2012-05-09-1", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2012/may/msg00001.html" }, { "title": "APPLE-SA-2012-02-01-1", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2012/feb/msg00000.html" }, { "title": "APPLE-SA-2014-02-25-1", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2014/feb/msg00000.html" }, { "title": "APPLE-SA-2011-10-12-2", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2011//oct/msg00002.html" }, { "title": "APPLE-SA-2011-10-12-1", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2011//oct/msg00001.html" }, { "title": "HT5281", "trust": 0.8, "url": "http://support.apple.com/kb/ht5281?viewlocale=ja_jp" }, { "title": "HT5416", "trust": 0.8, "url": "http://support.apple.com/kb/ht5416?viewlocale=ja_jp" }, { "title": "HT6011", "trust": 0.8, "url": "http://support.apple.com/kb/ht6011?viewlocale=ja_jp" }, { "title": "HT5130", "trust": 0.8, "url": "http://support.apple.com/kb/ht5130?viewlocale=ja_jp" }, { "title": "HT5501", "trust": 0.8, "url": "http://support.apple.com/kb/ht5501?viewlocale=ja_jp" }, { "title": "HT6150", "trust": 0.8, "url": "http://support.apple.com/kb/ht6150?viewlocale=ja_jp" }, { "title": "HT4999", "trust": 0.8, "url": "http://support.apple.com/kb/ht4999?viewlocale=ja_jp" }, { "title": "HT5001", "trust": 0.8, "url": "http://support.apple.com/kb/ht5001?viewlocale=ja_jp" }, { "title": "HT5045", "trust": 0.8, "url": "http://support.apple.com/kb/ht5045?viewlocale=ja_jp" }, { "title": "chrome-stable-release", "trust": 0.8, "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" }, { "title": "Revision 97269", "trust": 0.8, "url": "https://src.chromium.org/viewvc/chrome?view=rev\u0026revision=97269" }, { "title": "HS14-010", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-010/index.html" }, { "title": "HS15-031", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs15-031/index.html" }, { "title": "HS13-018", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs13-018/index.html" }, { "title": "HS14-011", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-011/index.html" }, { "title": "HS11-024", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs11-024/index.html" }, { "title": "HPSBMU02900", "trust": 0.8, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03839862" }, { "title": "HPSBMU02742 SSRT100740", "trust": 0.8, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03164351" }, { "title": "HPSBUX02730 SSRT100710", "trust": 0.8, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03122753" }, { "title": "Security alerts", "trust": 0.8, "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "title": "2588513", "trust": 0.8, "url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx" }, { "title": "2588513", "trust": 0.8, "url": "http://technet.microsoft.com/en-us/security/advisory/2588513" }, { "title": "MS12-006", "trust": 0.8, "url": "http://technet.microsoft.com/en-us/security/bulletin/ms12-006" }, { "title": "TLS \u6697\u53f7\u5316\u901a\u4fe1\u306b\u5bfe\u3059\u308b\u653b\u6483\u306e Firefox \u3078\u306e\u5f71\u97ff", "trust": 0.8, "url": "http://mozilla.jp/blog/entry/7289/" }, { "title": "attack-against-tls-protected-communications", "trust": 0.8, "url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/" }, { "title": "NV12-005", "trust": 0.8, "url": "http://jpn.nec.com/security-info/secinfo/nv12-005.html" }, { "title": "Bug 719047", "trust": 0.8, "url": "https://bugzilla.novell.com/show_bug.cgi?id=719047" }, { "title": "Security of CBC Ciphersuites in SSL/TLS: Problems and Countermeasures", "trust": 0.8, "url": "https://www.openssl.org/~bodo/tls-cbc.txt" }, { "title": "SUSE-SU-2012:0114", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" }, { "title": "SUSE-SU-2012:0122", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" }, { "title": "openSUSE-SU-2012:0030", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00009.html" }, { "title": "openSUSE-SU-2012:0063", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2012-01/msg00021.html" }, { "title": "windows/1160", "trust": 0.8, "url": "http://www.opera.com/docs/changelogs/windows/1160/" }, { "title": "unix/1160", "trust": 0.8, "url": "http://www.opera.com/docs/changelogs/unix/1160/" }, { "title": "mac/1160", "trust": 0.8, "url": "http://www.opera.com/docs/changelogs/mac/1160/" }, { "title": "javacpuoct2011-443431", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "title": "Oracle Critical Patch Update Advisory - January 2015", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "title": "Text Form of Oracle Critical Patch Update - January 2015 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015verbose-1972976.html" }, { "title": "Oracle Critical Patch Update Advisory - July 2015", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "title": "Oracle Critical Patch Update Advisory - October 2013", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "title": "Text Form of Oracle Critical Patch Update - July 2015 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015verbose-2367947.html" }, { "title": "Text Form of Oracle Critical Patch Update - October 2013 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013verbose-1899842.html" }, { "title": "Bug 737506", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "title": "RHSA-2011:1384", "trust": 0.8, "url": "http://www.redhat.com/support/errata/rhsa-2011-1384.html" }, { "title": "RHSA-2012:0006", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2012-0006.html" }, { "title": "RHSA-2013:1455", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2013-1455.html" }, { "title": "October 2013 Critical Patch Update Released", "trust": 0.8, "url": "https://blogs.oracle.com/security/entry/october_2013_critical_patch_update" }, { "title": "cve_2011_3389_chosen_plaintext1", "trust": 0.8, "url": "http://blogs.oracle.com/sunsecurity/entry/cve_2011_3389_chosen_plaintext1" }, { "title": "CVE-2011-3389 Vulnerability in NSS library affects Oracle iPlanet Web Proxy Server", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_3389_vulnerability_in" }, { "title": "Multiple vulnerabilities in Python", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_python" }, { "title": "January 2015 Critical Patch Update Released", "trust": 0.8, "url": "https://blogs.oracle.com/security/entry/january_2015_critical_patch_update" }, { "title": "Multiple vulnerabilities in fetchmail", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" }, { "title": "July 2015 Critical Patch Update Released", "trust": 0.8, "url": "https://blogs.oracle.com/security/entry/july_2015_critical_patch_update" }, { "title": "cve_2011_3389_chosen_plaintext", "trust": 0.8, "url": "http://blogs.oracle.com/sunsecurity/entry/cve_2011_3389_chosen_plaintext" }, { "title": "2588513", "trust": 0.8, "url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx" }, { "title": "VMSA-2012-0003.1", "trust": 0.8, "url": "http://www.vmware.com/security/advisories/vmsa-2012-0003.html" }, { "title": "HS14-010", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs14-010/index.html" }, { "title": "HS15-031", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs15-031/index.html" }, { "title": "HS13-018", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs13-018/index.html" }, { "title": "HS14-011", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs14-011/index.html" }, { "title": "HS11-024", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-024/index.html" }, { "title": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30a2\u30c9\u30d0\u30a4\u30b6\u30ea (2588513)", "trust": 0.8, "url": "https://technet.microsoft.com/ja-jp/security/advisory/2588513" }, { "title": "MS12-006", "trust": 0.8, "url": "http://technet.microsoft.com/ja-jp/security/bulletin/ms12-006" }, { "title": "TA12-010A", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta12-010a.html" }, { "title": "Debian CVElist Bug Report Logs: CVE-2011-4362: DoS because of incorrect code in src/http_auth.c:67", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=210cf4b6236578faf8f94374acf42746" }, { "title": "Debian CVElist Bug Report Logs: nss: CVE-2014-1569 information leak", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=ab91355beed7b295ca76667e7725b8ff" }, { "title": "Red Hat: Critical: java-1.4.2-ibm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120006 - security advisory" }, { "title": "Debian Security Advisories: DSA-2398-2 curl -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=aedc7511d582d3d92a5ba7329ed7d34e" }, { "title": "Red Hat: Moderate: java-1.4.2-ibm-sap security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120343 - security advisory" }, { "title": "Debian Security Advisories: DSA-2368-1 lighttpd -- multiple vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=013e897d92ab510d8719f5ffc2cb7e80" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=43a9f1e298f8daf772ebfe7187e61853" }, { "title": "Debian CVElist Bug Report Logs: asterisk: CVE-2015-3008: TLS Certificate Common name NULL byte exploit", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3dcc7cafafedb5ec8b84970acf17457b" }, { "title": "Red Hat: Critical: java-1.6.0-ibm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120034 - security advisory" }, { "title": "Debian CVElist Bug Report Logs: asterisk: chan_sip: File descriptors leak (UDP sockets) / AST-2016-007, CVE-2016-7551", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=84da1980846b47c2025a829646fab2ad" }, { "title": "Red Hat: Critical: thunderbird security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20121089 - security advisory" }, { "title": "Ubuntu Security Notice: openjdk-6, openjdk-6b18 regression", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1263-2" }, { "title": "Red Hat: Critical: firefox security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20121088 - security advisory" }, { "title": "Ubuntu Security Notice: icedtea-web, openjdk-6, openjdk-6b18 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1263-1" }, { "title": "Debian Security Advisories: DSA-2356-1 openjdk-6 -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=a48d7ee302b835c97c950b74a371fcfe" }, { "title": "Amazon Linux AMI: ALAS-2011-010", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2011-010" }, { "title": "IBM: IBM Security Bulletin: IBM Cognos Controller 2019Q2 Security Updater: Multiple vulnerabilities have been identified in IBM Cognos Controller", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=38227211accce022b0a3d9b56a974186" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=459961024c4bdce7bb3a1a40a65a6f2e" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=4a692d6d60aa31507cb101702b494c51" }, { "title": "Red Hat: Low: Red Hat Network Satellite server IBM Java Runtime security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20131455 - security advisory" }, { "title": "litecoin_demo", "trust": 0.1, "url": "https://github.com/swod00/litecoin_demo " }, { "title": "litecoin", "trust": 0.1, "url": "https://github.com/daniel1302/litecoin " }, { "title": "reg", "trust": 0.1, "url": "https://github.com/genuinetools/reg " }, { "title": "testssl-report", "trust": 0.1, "url": "https://github.com/tzaffi/testssl-report " }, { "title": "", "trust": 0.1, "url": "https://github.com/ricardobranco777/regview " }, { "title": "", "trust": 0.1, "url": "https://github.com/valdem88/dev-17_ib-yakovlev_vs " } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-3389" }, { "db": "JVNDB", "id": "JVNDB-2011-002305" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-326", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002305" }, { "db": "NVD", "id": "CVE-2011-3389" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx" }, { "trust": 2.1, "url": "http://www.kb.cert.org/vuls/id/864643" }, { "trust": 1.8, "url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html" }, { "trust": 1.8, "url": "http://vnhacker.blogspot.com/2011/09/beast.html" }, { "trust": 1.8, "url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx" }, { "trust": 1.8, "url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html" }, { "trust": 1.8, "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "trust": 1.8, "url": "http://www.us-cert.gov/cas/techalerts/ta12-010a.html" }, { "trust": 1.6, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03839862" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "trust": 1.3, "url": "http://www.opera.com/docs/changelogs/windows/1160/" }, { "trust": 1.3, "url": "http://www.opera.com/support/kb/view/1004/" }, { "trust": 1.3, "url": "http://curl.haxx.se/docs/adv_20120124b.html" }, { "trust": 1.3, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "trust": 1.3, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf" }, { "trust": 1.1, "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=665814" }, { "trust": 1.1, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-192-04" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3389" }, { "trust": 1.0, "url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/" }, { "trust": 1.0, "url": "http://downloads.asterisk.org/pub/security/ast-2016-001.html" }, { "trust": 1.0, "url": "http://ekoparty.org/2011/juliano-rizzo.php" }, { "trust": 1.0, "url": "http://eprint.iacr.org/2004/111" }, { "trust": 1.0, "url": "http://eprint.iacr.org/2006/136" }, { "trust": 1.0, "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" }, { "trust": 1.0, "url": "http://isc.sans.edu/diary/ssl+tls+part+3+/11635" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2011//oct/msg00001.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2011//oct/msg00002.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2012/feb/msg00000.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2012/jul/msg00001.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2012/may/msg00001.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2012/sep/msg00004.html" }, { "trust": 1.0, "url": "http://lists.apple.com/archives/security-announce/2013/oct/msg00004.html" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "trust": 1.0, "url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue" }, { "trust": 1.0, "url": "http://osvdb.org/74829" }, { "trust": 1.0, "url": "http://rhn.redhat.com/errata/rhsa-2012-0508.html" }, { "trust": 1.0, "url": "http://rhn.redhat.com/errata/rhsa-2013-1455.html" }, { "trust": 1.0, "url": "http://secunia.com/advisories/45791" }, { "trust": 1.0, "url": "http://secunia.com/advisories/47998" }, { "trust": 1.0, "url": "http://secunia.com/advisories/48256" }, { "trust": 1.0, "url": "http://secunia.com/advisories/48692" }, { "trust": 1.0, "url": "http://secunia.com/advisories/48915" }, { "trust": 1.0, "url": "http://secunia.com/advisories/48948" }, { "trust": 1.0, "url": "http://secunia.com/advisories/49198" }, { "trust": 1.0, "url": "http://secunia.com/advisories/55322" }, { "trust": 1.0, "url": "http://secunia.com/advisories/55350" }, { "trust": 1.0, "url": "http://secunia.com/advisories/55351" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "trust": 1.0, "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "trust": 1.0, "url": "http://support.apple.com/kb/ht4999" }, { "trust": 1.0, "url": "http://support.apple.com/kb/ht5001" }, { "trust": 1.0, "url": "http://support.apple.com/kb/ht5130" }, { "trust": 1.0, "url": "http://support.apple.com/kb/ht5281" }, { "trust": 1.0, "url": "http://support.apple.com/kb/ht5501" }, { "trust": 1.0, "url": "http://support.apple.com/kb/ht6150" }, { "trust": 1.0, "url": "http://technet.microsoft.com/security/advisory/2588513" }, { "trust": 1.0, "url": "http://www.apcmedia.com/salestools/sjhn-7rkgnm/sjhn-7rkgnm_r4_en.pdf" }, { "trust": 1.0, "url": "http://www.debian.org/security/2012/dsa-2398" }, { "trust": 1.0, "url": "http://www.insecure.cl/beast-ssl.rar" }, { "trust": 1.0, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:058" }, { "trust": 1.0, "url": "http://www.opera.com/docs/changelogs/mac/1151/" }, { "trust": 1.0, "url": "http://www.opera.com/docs/changelogs/mac/1160/" }, { "trust": 1.0, "url": "http://www.opera.com/docs/changelogs/unix/1151/" }, { "trust": 1.0, "url": "http://www.opera.com/docs/changelogs/unix/1160/" }, { "trust": 1.0, "url": "http://www.opera.com/docs/changelogs/windows/1151/" }, { "trust": 1.0, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2011-1384.html" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2012-0006.html" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/49388" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/49778" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id/1029190" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id?1025997" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id?1026103" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id?1026704" }, { "trust": 1.0, "url": "http://www.ubuntu.com/usn/usn-1263-1" }, { "trust": 1.0, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" }, { "trust": 1.0, "url": "https://bugzilla.novell.com/show_bug.cgi?id=719047" }, { "trust": 1.0, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "trust": 1.0, "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006" }, { "trust": 1.0, "url": "https://hermes.opensuse.org/messages/13154861" }, { "trust": 1.0, "url": "https://hermes.opensuse.org/messages/13155432" }, { "trust": 1.0, "url": "https://ics-cert.us-cert.gov/advisories/icsma-18-058-02" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14752" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3389" }, { "trust": 0.8, "url": "http://www.openssl.org/~bodo/tls-cbc.txt" }, { "trust": 0.8, "url": "http://www.phonefactor.com/blog/slaying-beast-mitigating-the-latest-ssltls-vulnerability.php" }, { "trust": 0.8, "url": "https://blog.torproject.org/blog/tor-and-beast-ssl-attack" }, { "trust": 0.8, "url": "http://src.chromium.org/viewvc/chrome?view=rev\u0026revision=97269" }, { "trust": 0.8, "url": "http://www.ekoparty.org/2011/juliano-rizzo.php" }, { "trust": 0.8, "url": "http://ics-cert.us-cert.gov/advisories/icsa-14-098-03" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ics/advisories/icsma-18-058-02" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu381963/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95174988/" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu864643" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta12-010a/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95868425/" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu700214" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu692779" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3389" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3560" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3552" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3556" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3557" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3548" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3547" }, { "trust": 0.4, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs11-024/index.html" }, { "trust": 0.3, "url": "http://www.collax.com/download/file/target/frame/file/2926" }, { "trust": 0.3, "url": "http://www.collax.com/produkte/allinone-server-for-small-businesses" }, { "trust": 0.3, "url": "http://www.collax.com/download/file/target/frame/file/2930" }, { "trust": 0.3, "url": "http://www.collax.com/produkte/email-calendar-contacts-in-a-safe-business-server" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21578730" }, { "trust": 0.3, "url": "http://blogs.oracle.com/sunsecurity/entry/cve_2011_3389_chosen_plaintext2" }, { "trust": 0.3, "url": "seclists.org/bugtraq/2014/apr/att-70/esa-2012-032.txt" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2012/sep/att-39/esa-2012-032.txt" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2014/mar/att-156/esa-2014-016.txt" }, { "trust": 0.3, "url": "http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/" }, { "trust": 0.3, "url": "http://xforce.iss.net/xforce/xfdb/70069" }, { "trust": 0.3, "url": "http://www.kerio.com/connect/history" }, { "trust": 0.3, "url": "http://www.matrixssl.org/" }, { "trust": 0.3, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_python" }, { "trust": 0.3, "url": "http://www.novell.com/support/viewcontent.do?externalid=7009901\u0026sliceid=1" }, { "trust": 0.3, "url": "http://www.opera.com/support/kb/view/1000/" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1pm60958" }, { "trust": 0.3, "url": "https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_ibm_system_x_and_flex_systems_browser_exploit_against_ssl_tls_beast_mitigations_cve_2011_33891?lang=en_us" }, { "trust": 0.3, "url": "http://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21568229" }, { "trust": 0.3, "url": "http://www.ietf.org/rfc/rfc2246.txt" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21571596" }, { "trust": 0.3, "url": "/archive/1/524142" }, { "trust": 0.3, "url": "http://support.apple.com/kb/ht5416" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100151219" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100150852" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100154049" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100154899" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2013/jun/att-65/esa-2013-039.txt" }, { "trust": 0.3, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03358587" }, { "trust": 0.3, "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?docid=emr_na-c03909126-1\u0026ac.admitted=1378134276525.876444892.492883150" }, { "trust": 0.3, "url": "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03266681\u0026ac.admitted=1333452464452.876444892.492883150" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5093636" }, { "trust": 0.3, "url": "http://technet.microsoft.com/en-us/security/advisory/2588513" }, { "trust": 0.3, "url": "http://technet.microsoft.com/en-us/security/bulletin/ms12-006" }, { "trust": 0.3, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs13-018/index.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21643845" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5093630" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21641966" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022152" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21609004" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21609022" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1019998" }, { "trust": 0.3, "url": "http://lists.vmware.com/pipermail/security-announce/2012/000162.html" }, { "trust": 0.3, "url": "http://www.vmware.com/security/advisories/vmsa-2012-0005.html" }, { "trust": 0.3, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-011/index.html" }, { "trust": 0.3, "url": "http://www.xerox.com/download/security/security-bulletin/12047-4e4eed8d42ca6/cert_xrx13-007_v1.0.pdf" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2011-3560.html" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2011-3547.html" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2011-3548.html" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2011-3557.html" }, { "trust": 0.3, "url": "https://access.redhat.com/kb/docs/doc-11259" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3549" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3521" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2011-3556.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3545" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3553" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3554" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2011-3389.html" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3544" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3551" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2011-3552.html" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.3, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2311" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-3554.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-3553.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-3549.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-3551.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-3545.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-3544.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-3521.html" }, { "trust": 0.2, "url": "http://www.debian.org/security/faq" }, { "trust": 0.2, "url": "http://www.debian.org/security/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0865" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0864" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0862" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0867" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0871" }, { "trust": 0.2, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.2, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.2, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4474" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3574" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3548" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3565" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3563" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3570" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0864" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3553" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3555" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4451" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3560" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3516" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3557" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4450" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3550" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0865" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4471" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3550" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3557" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3562" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3567" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3556" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3550" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4447" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4476" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3549" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3554" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3563" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0862" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4466" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3568" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3561" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4467" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3567" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4465" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4472" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3556" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0863" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3568" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3548" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3558" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3541" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3566" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3549" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3562" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3555" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3556" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3573" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3552" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4462" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4469" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3572" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4448" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3521" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3571" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3546" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3569" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3559" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0871" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0815" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3571" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3561" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3554" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3558" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4475" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3569" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3559" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3573" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3548" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3541" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3549" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3565" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0872" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3552" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3554" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3574" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3552" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4470" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3553" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0867" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4468" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3551" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4463" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3560" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3544" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3570" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3545" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3547" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3560" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0869" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3555" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3566" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4452" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0802" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3551" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4422" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3553" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4473" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3558" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201111-02.xml" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3572" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0873" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3561" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0868" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4454" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3389" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3551" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3557" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46694/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/vim/ovum_2011_request/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46694" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46694/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2358" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2357" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2362" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2361" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2364" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2363" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2359" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2329" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2335" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2356" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2110" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2336" }, { "trust": 0.1, "url": "http://h18013.www1.hp.com/products/servers/management/agents/index.html" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5217" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0883" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2355" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2360" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3550" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3546" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3546.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3516.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3516" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2012-0034.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3561.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3561" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3550.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4362" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0868" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0869" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1255" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6629" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5179" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1250" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1245" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1259" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5987" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1254" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1256" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1258" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1249" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1248" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1247" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4073" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5178" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5139" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1261" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1896" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1260" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1246" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1862" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1257" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5986" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4248" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4113" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1252" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2012-0006.html" }, { "trust": 0.1, "url": "http://www.fetchmail.info/fetchmail-sa-2012-01.txt" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3482" }, { "trust": 0.1, "url": "http://www.fetchmail.info/fetchmail-sa-2012-02.txt" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3482" }, { "trust": 0.1, "url": "http://www.php.net" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2688" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3718" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4313" }, { "trust": 0.1, "url": "http://http//support.apple.com/kb/ht5502" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3048" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0668" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3368" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4317" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0831" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0670" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0671" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1173" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2143" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1172" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0652" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4599" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1823" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1667" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2386" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3607" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0021" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0650" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "http://httpd.apache.org/." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3026" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0643" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0053" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3716" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4469" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3563" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4448" }, { "trust": 0.1, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4454" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0815" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4476" }, { "trust": 0.1, "url": "http://www.hp.com/go/java" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0499" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4462" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4465" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4475" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4473" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4447" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0802" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0814" }, { "trust": 0.1, "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.9/file/328afd896e3e/news" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2011-1380.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3558" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3558.html" } ], "sources": [ { "db": "CERT/CC", "id": "VU#864643" }, { "db": "BID", "id": "49778" }, { "db": "JVNDB", "id": "JVNDB-2011-002305" }, { "db": "PACKETSTORM", "id": "106640" }, { "db": "PACKETSTORM", "id": "106747" }, { "db": "PACKETSTORM", "id": "122468" }, { "db": "PACKETSTORM", "id": "108800" }, { "db": "PACKETSTORM", "id": "108077" }, { "db": "PACKETSTORM", "id": "107532" }, { "db": "PACKETSTORM", "id": "125427" }, { "db": "PACKETSTORM", "id": "108498" }, { "db": "PACKETSTORM", "id": "121097" }, { "db": "PACKETSTORM", "id": "116792" }, { "db": "PACKETSTORM", "id": "112826" }, { "db": "PACKETSTORM", "id": "105967" }, { "db": "NVD", "id": "CVE-2011-3389" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#864643" }, { "db": "VULMON", "id": "CVE-2011-3389" }, { "db": "BID", "id": "49778" }, { "db": "JVNDB", "id": "JVNDB-2011-002305" }, { "db": "PACKETSTORM", "id": "106640" }, { "db": "PACKETSTORM", "id": "106747" }, { "db": "PACKETSTORM", "id": "122468" }, { "db": "PACKETSTORM", "id": "108800" }, { "db": "PACKETSTORM", "id": "108077" }, { "db": "PACKETSTORM", "id": "107532" }, { "db": "PACKETSTORM", "id": "125427" }, { "db": "PACKETSTORM", "id": "108498" }, { "db": "PACKETSTORM", "id": "121097" }, { "db": "PACKETSTORM", "id": "116792" }, { "db": "PACKETSTORM", "id": "112826" }, { "db": "PACKETSTORM", "id": "105967" }, { "db": "NVD", "id": "CVE-2011-3389" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-09-27T00:00:00", "db": "CERT/CC", "id": "VU#864643" }, { "date": "2011-09-06T00:00:00", "db": "VULMON", "id": "CVE-2011-3389" }, { "date": "2011-09-19T00:00:00", "db": "BID", "id": "49778" }, { "date": "2011-10-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002305" }, { "date": "2011-11-06T01:01:42", "db": "PACKETSTORM", "id": "106640" }, { "date": "2011-11-08T04:55:18", "db": "PACKETSTORM", "id": "106747" }, { "date": "2013-07-18T18:51:07", "db": "PACKETSTORM", "id": "122468" }, { "date": "2012-01-18T23:25:42", "db": "PACKETSTORM", "id": "108800" }, { "date": "2011-12-21T21:54:51", "db": "PACKETSTORM", "id": "108077" }, { "date": "2011-12-05T14:44:00", "db": "PACKETSTORM", "id": "107532" }, { "date": "2014-02-26T22:21:07", "db": "PACKETSTORM", "id": "125427" }, { "date": "2012-01-09T22:38:38", "db": "PACKETSTORM", "id": "108498" }, { "date": "2013-04-05T21:15:11", "db": "PACKETSTORM", "id": "121097" }, { "date": "2012-09-22T06:30:43", "db": "PACKETSTORM", "id": "116792" }, { "date": "2012-05-17T21:16:37", "db": "PACKETSTORM", "id": "112826" }, { "date": "2011-10-19T00:58:21", "db": "PACKETSTORM", "id": "105967" }, { "date": "2011-09-06T19:55:03.197000", "db": "NVD", "id": "CVE-2011-3389" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-12-08T00:00:00", "db": "CERT/CC", "id": "VU#864643" }, { "date": "2022-11-29T00:00:00", "db": "VULMON", "id": "CVE-2011-3389" }, { "date": "2019-07-16T13:00:00", "db": "BID", "id": "49778" }, { "date": "2019-07-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002305" }, { "date": "2022-11-29T15:56:08.637000", "db": "NVD", "id": "CVE-2011-3389" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "49778" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SSL 3.0 and TLS 1.0 allow chosen plaintext attack in CBC modes", "sources": [ { "db": "CERT/CC", "id": "VU#864643" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "49778" } ], "trust": 0.3 } }
wid-sec-w-2023-1435
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Relion-Produktfamilie umfasst Produkte f\u00fcr Schutz, Steuerung, Messung und \u00dcberwachung von Energiesystemen f\u00fcr IEC- und ANSI-Anwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Hitachi Energy Relion ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1435 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1435.json" }, { "category": "self", "summary": "WID-SEC-2023-1435 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1435" }, { "category": "external", "summary": "ABB Relion REX640 Cyber Security Improvements vom 2023-06-12", "url": "https://library.e.abb.com/public/1f777da94ee04c6a8108533b46c46971/ABB%20Relion%20REX640%20Cyber%20Security%20Improvements_Rev.A.pdf" } ], "source_lang": "en-US", "title": "Hitachi Energy Relion: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-12T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:30:51.815+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1435", "initial_release_date": "2023-06-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Energy Relion REX640 FW \u003c 1.0.8", "product": { "name": "Hitachi Energy Relion REX640 FW \u003c 1.0.8", "product_id": "T028062", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:rex640_fw__1.0.8" } } }, { "category": "product_name", "name": "Hitachi Energy Relion REX640 FW \u003c 1.1.4", "product": { "name": "Hitachi Energy Relion REX640 FW \u003c 1.1.4", "product_id": "T028063", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:rex640_fw__1.1.4" } } }, { "category": "product_name", "name": "Hitachi Energy Relion REX640 FW \u003c 1.2.1", "product": { "name": "Hitachi Energy Relion REX640 FW \u003c 1.2.1", "product_id": "T028064", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:rex640_fw__1.2.1" } } } ], "category": "product_name", "name": "Relion" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-2876", "notes": [ { "category": "description", "text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-2876" }, { "cve": "CVE-2013-0169", "notes": [ { "category": "description", "text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2013-0169" }, { "cve": "CVE-2011-3389", "notes": [ { "category": "description", "text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2011-3389" }, { "cve": "CVE-2011-1473", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Hitachi Energy Relion. Der Fehler besteht aufgrund einer nicht ordnungsgem\u00e4\u00df funktionierenden TLS-Sitzungsneuaushandlung auf Client-Seite. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2011-1473" } ] }
WID-SEC-W-2023-1435
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Relion-Produktfamilie umfasst Produkte f\u00fcr Schutz, Steuerung, Messung und \u00dcberwachung von Energiesystemen f\u00fcr IEC- und ANSI-Anwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Hitachi Energy Relion ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1435 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1435.json" }, { "category": "self", "summary": "WID-SEC-2023-1435 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1435" }, { "category": "external", "summary": "ABB Relion REX640 Cyber Security Improvements vom 2023-06-12", "url": "https://library.e.abb.com/public/1f777da94ee04c6a8108533b46c46971/ABB%20Relion%20REX640%20Cyber%20Security%20Improvements_Rev.A.pdf" } ], "source_lang": "en-US", "title": "Hitachi Energy Relion: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-12T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:30:51.815+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1435", "initial_release_date": "2023-06-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Energy Relion REX640 FW \u003c 1.0.8", "product": { "name": "Hitachi Energy Relion REX640 FW \u003c 1.0.8", "product_id": "T028062", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:rex640_fw__1.0.8" } } }, { "category": "product_name", "name": "Hitachi Energy Relion REX640 FW \u003c 1.1.4", "product": { "name": "Hitachi Energy Relion REX640 FW \u003c 1.1.4", "product_id": "T028063", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:rex640_fw__1.1.4" } } }, { "category": "product_name", "name": "Hitachi Energy Relion REX640 FW \u003c 1.2.1", "product": { "name": "Hitachi Energy Relion REX640 FW \u003c 1.2.1", "product_id": "T028064", "product_identification_helper": { "cpe": "cpe:/h:abb:relion:rex640_fw__1.2.1" } } } ], "category": "product_name", "name": "Relion" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-2876", "notes": [ { "category": "description", "text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-2876" }, { "cve": "CVE-2013-0169", "notes": [ { "category": "description", "text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2013-0169" }, { "cve": "CVE-2011-3389", "notes": [ { "category": "description", "text": "In Hitachi Energy Relion existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer unsicherer TLS-Konfigurationen in Lucky13 und BEAST und der Preisgabe eines sensiblen Cookies in einer HTTPS-Sitzung ohne \"HttpOnly\"-Flag. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen. Das erfolgreiche Ausnutzen einer dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2011-3389" }, { "cve": "CVE-2011-1473", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Hitachi Energy Relion. Der Fehler besteht aufgrund einer nicht ordnungsgem\u00e4\u00df funktionierenden TLS-Sitzungsneuaushandlung auf Client-Seite. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2011-1473" } ] }
gsd-2011-3389
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2011-3389", "description": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "id": "GSD-2011-3389", "references": [ "https://www.suse.com/security/cve/CVE-2011-3389.html", "https://www.debian.org/security/2012/dsa-2398", "https://www.debian.org/security/2011/dsa-2368", "https://www.debian.org/security/2011/dsa-2358", "https://www.debian.org/security/2011/dsa-2356", "https://access.redhat.com/errata/RHSA-2013:1455", "https://access.redhat.com/errata/RHSA-2012:0508", "https://access.redhat.com/errata/RHSA-2012:0343", "https://access.redhat.com/errata/RHSA-2012:0034", "https://access.redhat.com/errata/RHSA-2012:0006", "https://access.redhat.com/errata/RHSA-2011:1384", "https://access.redhat.com/errata/RHSA-2011:1380", "https://alas.aws.amazon.com/cve/html/CVE-2011-3389.html", "https://linux.oracle.com/cve/CVE-2011-3389.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-3389" ], "details": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "id": "GSD-2011-3389", "modified": "2023-12-13T01:19:09.516346Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3389", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "74829", "refsource": "OSVDB", "url": "http://osvdb.org/74829" }, { "name": "http://eprint.iacr.org/2004/111", "refsource": "MISC", "url": "http://eprint.iacr.org/2004/111" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635", "refsource": "MISC", "url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "48692", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48692" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf", "refsource": "CONFIRM", "url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf" }, { "name": "SSRT100805", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "55322", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55322" }, { "name": "http://support.apple.com/kb/HT5130", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5130" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=737506", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "name": "HPSBUX02730", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2" }, { "name": "SUSE-SU-2012:0602", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "name": "1025997", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025997" }, { "name": "TA12-010A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html" }, { "name": "APPLE-SA-2011-10-12-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "name": "SUSE-SU-2012:0114", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" }, { "name": "49388", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49388" }, { "name": "http://ekoparty.org/2011/juliano-rizzo.php", "refsource": "MISC", "url": "http://ekoparty.org/2011/juliano-rizzo.php" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2016-001.html", "refsource": "CONFIRM", "url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" }, { "name": "RHSA-2013:1455", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "55351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55351" }, { "name": "SSRT100710", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2" }, { "name": "VU#864643", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/864643" }, { "name": "APPLE-SA-2013-10-22-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "49778", "refsource": "BID", "url": "http://www.securityfocus.com/bid/49778" }, { "name": "DSA-2398", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2398" }, { "name": "48948", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48948" }, { "name": "http://support.apple.com/kb/HT6150", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6150" }, { "name": "APPLE-SA-2012-02-01-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "http://technet.microsoft.com/security/advisory/2588513", "refsource": "CONFIRM", "url": "http://technet.microsoft.com/security/advisory/2588513" }, { "name": "openSUSE-SU-2012:0063", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/13155432" }, { "name": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx", "refsource": "CONFIRM", "url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx" }, { "name": "RHSA-2011:1384", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html" }, { "name": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx", "refsource": "CONFIRM", "url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx" }, { "name": "http://www.opera.com/docs/changelogs/windows/1151/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/windows/1151/" }, { "name": "openSUSE-SU-2012:0030", "refsource": "SUSE", "url": "https://hermes.opensuse.org/messages/13154861" }, { "name": "http://eprint.iacr.org/2006/136", "refsource": "MISC", "url": "http://eprint.iacr.org/2006/136" }, { "name": "48915", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48915" }, { "name": "GLSA-201203-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "name": "SSRT100740", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2" }, { "name": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html", "refsource": "MISC", "url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html" }, { "name": "48256", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48256" }, { "name": "APPLE-SA-2012-09-19-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "name": "1026103", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026103" }, { "name": "http://support.apple.com/kb/HT4999", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4999" }, { "name": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html", "refsource": "CONFIRM", "url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html" }, { "name": "http://support.apple.com/kb/HT5501", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5501" }, { "name": "http://www.insecure.cl/Beast-SSL.rar", "refsource": "MISC", "url": "http://www.insecure.cl/Beast-SSL.rar" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02" }, { "name": "http://support.apple.com/kb/HT5001", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5001" }, { "name": "http://www.opera.com/docs/changelogs/mac/1160/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/mac/1160/" }, { "name": "http://curl.haxx.se/docs/adv_20120124B.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20120124B.html" }, { "name": "http://www.opera.com/support/kb/view/1004/", "refsource": "CONFIRM", "url": "http://www.opera.com/support/kb/view/1004/" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "name": "1026704", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026704" }, { "name": "APPLE-SA-2012-07-25-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html" }, { "name": "HPSBMU02742", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2" }, { "name": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue", "refsource": "CONFIRM", "url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue" }, { "name": "RHSA-2012:0508", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "name": "45791", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45791" }, { "name": "1029190", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029190" }, { "name": "MDVSA-2012:058", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058" }, { "name": "47998", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47998" }, { "name": "SSRT100867", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49198" }, { "name": "RHSA-2012:0006", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html" }, { "name": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/", "refsource": "CONFIRM", "url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/" }, { "name": "http://www.opera.com/docs/changelogs/windows/1160/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/windows/1160/" }, { "name": "SUSE-SU-2012:0122", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" }, { "name": "HPSBUX02777", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14752", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752" }, { "name": "http://www.opera.com/docs/changelogs/unix/1151/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/unix/1151/" }, { "name": "http://www.opera.com/docs/changelogs/mac/1151/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/mac/1151/" }, { "name": "MS12-006", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006" }, { "name": "HPSBUX02760", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "http://www.opera.com/docs/changelogs/unix/1160/", "refsource": "CONFIRM", "url": "http://www.opera.com/docs/changelogs/unix/1160/" }, { "name": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" }, { "name": "http://support.apple.com/kb/HT5281", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5281" }, { "name": "SSRT100854", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "APPLE-SA-2011-10-12-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=719047", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=719047" }, { "name": "HPSBMU02900", "refsource": "HP", "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862" }, { "name": "http://vnhacker.blogspot.com/2011/09/beast.html", "refsource": "MISC", "url": "http://vnhacker.blogspot.com/2011/09/beast.html" }, { "name": "USN-1263-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1263-1" }, { "name": "APPLE-SA-2012-05-09-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "55350", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55350" }, { "name": "HPSBMU02797", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "http://www.ibm.com/developerworks/java/jdk/alerts/", "refsource": "CONFIRM", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf" }, { "name": "openSUSE-SU-2020:0086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_rf68xr_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_rf68xr:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_rf615r_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_rf615r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.23.1", "versionStartIncluding": "7.10.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3389" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-326" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.opera.com/docs/changelogs/unix/1151/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.opera.com/docs/changelogs/unix/1151/" }, { "name": "49388", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/49388" }, { "name": "http://www.opera.com/docs/changelogs/windows/1151/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.opera.com/docs/changelogs/windows/1151/" }, { "name": "http://www.opera.com/docs/changelogs/mac/1151/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.opera.com/docs/changelogs/mac/1151/" }, { "name": "74829", "refsource": "OSVDB", "tags": [ "Broken Link" ], "url": "http://osvdb.org/74829" }, { "name": "45791", "refsource": "SECUNIA", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/45791" }, { "name": "1025997", "refsource": "SECTRACK", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025997" }, { "name": "http://eprint.iacr.org/2004/111", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://eprint.iacr.org/2004/111" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=737506", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "name": "http://ekoparty.org/2011/juliano-rizzo.php", "refsource": "MISC", "tags": [ "Broken Link" ], "url": "http://ekoparty.org/2011/juliano-rizzo.php" }, { "name": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.imperialviolet.org/2011/09/23/chromeandbeast.html" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=719047", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=719047" }, { "name": "http://www.insecure.cl/Beast-SSL.rar", "refsource": "MISC", "tags": [ "Broken Link", "Patch" ], "url": "http://www.insecure.cl/Beast-SSL.rar" }, { "name": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html", "refsource": "MISC", "tags": [ "Broken Link" ], "url": "http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html" }, { "name": "http://eprint.iacr.org/2006/136", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://eprint.iacr.org/2006/136" }, { "name": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://isc.sans.edu/diary/SSL+TLS+part+3+/11635" }, { "name": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue" }, { "name": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/" }, { "name": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx" }, { "name": "http://technet.microsoft.com/security/advisory/2588513", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://technet.microsoft.com/security/advisory/2588513" }, { "name": "http://support.apple.com/kb/HT4999", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT4999" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "name": "http://support.apple.com/kb/HT5001", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5001" }, { "name": "APPLE-SA-2011-10-12-1", "refsource": "APPLE", "tags": [ "Broken Link" ], "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "name": "APPLE-SA-2011-10-12-2", "refsource": "APPLE", "tags": [ "Broken Link" ], "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" }, { "name": "1026103", "refsource": "SECTRACK", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1026103" }, { "name": "49778", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/49778" }, { "name": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx" }, { "name": "RHSA-2011:1384", "refsource": "REDHAT", "tags": [ "Third Party Advisory", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html" }, { "name": "http://vnhacker.blogspot.com/2011/09/beast.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://vnhacker.blogspot.com/2011/09/beast.html" }, { "name": "VU#864643", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/864643" }, { "name": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html", "refsource": "CONFIRM", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html" }, { "name": "http://www.ibm.com/developerworks/java/jdk/alerts/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "name": "http://www.opera.com/docs/changelogs/windows/1160/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.opera.com/docs/changelogs/windows/1160/" }, { "name": "http://www.opera.com/docs/changelogs/mac/1160/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.opera.com/docs/changelogs/mac/1160/" }, { "name": "http://www.opera.com/support/kb/view/1004/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory", "Vendor Advisory" ], "url": "http://www.opera.com/support/kb/view/1004/" }, { "name": "http://www.opera.com/docs/changelogs/unix/1160/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.opera.com/docs/changelogs/unix/1160/" }, { "name": "RHSA-2012:0006", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2012-0006.html" }, { "name": "http://support.apple.com/kb/HT5130", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "APPLE-SA-2012-02-01-1", "refsource": "APPLE", "tags": [ "Broken Link", "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "SSRT100740", "refsource": "HP", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=132872385320240\u0026w=2" }, { "name": "http://support.apple.com/kb/HT5281", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "http://support.apple.com/kb/HT5281" }, { "name": "APPLE-SA-2012-05-09-1", "refsource": "APPLE", "tags": [ "Broken Link", "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "APPLE-SA-2012-07-25-2", "refsource": "APPLE", "tags": [ "Broken Link", "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html" }, { "name": "http://support.apple.com/kb/HT5501", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5501" }, { "name": "APPLE-SA-2012-09-19-2", "refsource": "APPLE", "tags": [ "Broken Link", "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "name": "49198", "refsource": "SECUNIA", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/49198" }, { "name": "SUSE-SU-2012:0122", "refsource": "SUSE", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" }, { "name": "openSUSE-SU-2012:0063", "refsource": "SUSE", "tags": [ "Broken Link" ], "url": "https://hermes.opensuse.org/messages/13155432" }, { "name": "openSUSE-SU-2012:0030", "refsource": "SUSE", "tags": [ "Broken Link" ], "url": "https://hermes.opensuse.org/messages/13154861" }, { "name": "SUSE-SU-2012:0114", "refsource": "SUSE", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" }, { "name": "HPSBUX02730", "refsource": "HP", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=132750579901589\u0026w=2" }, { "name": "48692", "refsource": "SECUNIA", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/48692" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail" }, { "name": "48948", "refsource": "SECUNIA", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/48948" }, { "name": "48915", "refsource": "SECUNIA", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/48915" }, { "name": "TA12-010A", "refsource": "CERT", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html" }, { "name": "HPSBMU02900", "refsource": "HP", "tags": [ "Broken Link" ], "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862" }, { "name": "55351", "refsource": "SECUNIA", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/55351" }, { "name": "55322", "refsource": "SECUNIA", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/55322" }, { "name": "55350", "refsource": "SECUNIA", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/55350" }, { "name": "1029190", "refsource": "SECTRACK", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029190" }, { "name": "RHSA-2013:1455", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "APPLE-SA-2013-10-22-3", "refsource": "APPLE", "tags": [ "Broken Link", "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "name": "USN-1263-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1263-1" }, { "name": "http://support.apple.com/kb/HT6150", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT6150" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "http://downloads.asterisk.org/pub/security/AST-2016-001.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://downloads.asterisk.org/pub/security/AST-2016-001.html" }, { "name": "SSRT100867", "refsource": "HP", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "SSRT100805", "refsource": "HP", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "HPSBUX02777", "refsource": "HP", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf" }, { "name": "oval:org.mitre.oval:def:14752", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752" }, { "name": "HPSBMU02799", "refsource": "HP", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "MDVSA-2012:058", "refsource": "MANDRIVA", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:058" }, { "name": "RHSA-2012:0508", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "name": "SUSE-SU-2012:0602", "refsource": "SUSE", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "name": "GLSA-201203-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "name": "48256", "refsource": "SECUNIA", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/48256" }, { "name": "1026704", "refsource": "SECTRACK", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1026704" }, { "name": "47998", "refsource": "SECUNIA", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/47998" }, { "name": "DSA-2398", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2012/dsa-2398" }, { "name": "http://curl.haxx.se/docs/adv_20120124B.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://curl.haxx.se/docs/adv_20120124B.html" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02", "refsource": "MISC", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02" }, { "name": "MS12-006", "refsource": "MS", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf" }, { "name": "openSUSE-SU-2020:0086", "refsource": "SUSE", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2022-11-29T15:56Z", "publishedDate": "2011-09-06T19:55Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.