Security Advisory Moderate: java-1.4.2-ibm-sap security update

Advisory: RHSA-2012:1332-1
Type: Security Advisory
Severity: Moderate
Issued on: 2012-10-03
Last updated on: 2012-10-03
Affected Products: Red Hat Enterprise Linux for SAP
CVEs ( CVE-2012-1713


Updated java-1.4.2-ibm-sap packages that fix several security issues are
now available for Red Hat Enterprise Linux 5 and 6 for SAP.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

IBM J2SE version 1.4.2 includes the IBM Java Runtime Environment and the
IBM Java Software Development Kit.

This update fixes several vulnerabilities in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Detailed
vulnerability descriptions are linked from the IBM Security alerts page,
listed in the References section. (CVE-2012-1713, CVE-2012-1717,
CVE-2012-1718, CVE-2012-1719)

All users of java-1.4.2-ibm-sap are advised to upgrade to these updated
packages, which contain the IBM J2SE 1.4.2 SR13-FP13 release. All running
instances of IBM Java must be restarted for this update to take effect.


Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

Updated packages

Red Hat Enterprise Linux for SAP

File outdated by:  RHSA-2012:1577
    MD5: f739d7bd6ab9edcc030868089deb9d88
SHA-256: 9b05d60a7ef84d94688004a9670e22a3a73174e0abc1ae39cc4ea1aca1aa40a8
File outdated by:  RHSA-2012:1577
    MD5: f5eecbd0d17f43d79c69cbe026f7a007
SHA-256: fc2c2fc6c64afae4bf7d4feeae01a13b2cd687af3e090a695a6536c9ce9100d7
File outdated by:  RHSA-2012:1577
    MD5: 13e0985b37f24ca81edda59b55f6ffce
SHA-256: 4e92d68ab7be66d8beef02430037ec9f9116f92f396287802682ec455f3253fd
File outdated by:  RHSA-2012:1577
    MD5: 8be389f7c13875509876d600371f1120
SHA-256: 804a2c19c40d13a8ae1622b04e6e524ff169ccfd04bd5a08dca34ec60c7705a2
File outdated by:  RHSA-2012:1577
    MD5: 13bf562f71c241d4abe7a5861ea3c135
SHA-256: 707bc6315b40d6c8b465c427ba01f69254219f5113ce1382303ef8a76a2c8b89
File outdated by:  RHSA-2012:1577
    MD5: ed81f4e19e6e8bffd6b056c364b7a0ac
SHA-256: 581766a7f1a6eed5707582d83dae85f20403463fd798b55eedd34e3b54439c2b
File outdated by:  RHSA-2012:1577
    MD5: 393816a1003ca28e8df6141bc8a2d0cb
SHA-256: aa7d9f19fcde327b739155eb3fff0aefb5124a0d18296d032d7e4014b75c2dfe
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

829358 - CVE-2012-1717 OpenJDK: insecure temporary file permissions (JRE, 7143606)
829361 - CVE-2012-1713 OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)
829371 - CVE-2012-1719 OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)
829372 - CVE-2012-1718 OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at