Skip to navigation

Security Advisory Critical: java-1.6.0-sun security update

Advisory: RHSA-2012:1392-1
Type: Security Advisory
Severity: Critical
Issued on: 2012-10-18
Last updated on: 2012-10-18
Affected Products: RHEL Desktop Supplementary (v. 5 client)
RHEL Supplementary (v. 5 server)
Red Hat Enterprise Linux Desktop Supplementary (v. 6)
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation Supplementary (v. 6)
CVEs (cve.mitre.org): CVE-2012-0547
CVE-2012-1531
CVE-2012-1532
CVE-2012-1533
CVE-2012-3143
CVE-2012-3159
CVE-2012-3216
CVE-2012-4416
CVE-2012-5068
CVE-2012-5069
CVE-2012-5071
CVE-2012-5072
CVE-2012-5073
CVE-2012-5075
CVE-2012-5077
CVE-2012-5079
CVE-2012-5081
CVE-2012-5083
CVE-2012-5084
CVE-2012-5085
CVE-2012-5086
CVE-2012-5089

Details

Updated java-1.6.0-sun packages that fix several security issues are now
available for Red Hat Enterprise Linux 5 and 6 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Oracle Java SE version 6 includes the Oracle Java Runtime Environment and
the Oracle Java Software Development Kit.

This update fixes several vulnerabilities in the Oracle Java Runtime
Environment and the Oracle Java Software Development Kit. Further
information about these flaws can be found on the Oracle Java SE Critical
Patch Update Advisory and Oracle Security Alert pages, listed in the
References section. (CVE-2012-0547, CVE-2012-1531, CVE-2012-1532,
CVE-2012-1533, CVE-2012-3143, CVE-2012-3159, CVE-2012-3216, CVE-2012-4416,
CVE-2012-5068, CVE-2012-5069, CVE-2012-5071, CVE-2012-5072, CVE-2012-5073,
CVE-2012-5075, CVE-2012-5077, CVE-2012-5079, CVE-2012-5081, CVE-2012-5083,
CVE-2012-5084, CVE-2012-5085, CVE-2012-5086, CVE-2012-5089)

All users of java-1.6.0-sun are advised to upgrade to these updated
packages, which provide Oracle Java 6 Update 37. All running instances of
Oracle Java must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Desktop Supplementary (v. 5 client)

IA-32:
java-1.6.0-sun-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 37d5f477a4abc5003a9b0987c2bf84e7
SHA-256: 55148c6dd43e07fd6d0ba3f2c967e26b030f7cda0303ad63bc703a445d5b2f54
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 57f15e45dd41b4bb44c5f9a071d09848
SHA-256: e32b005683dc553ae27dca6af801c2d6fb0776ec2ca1637ac0477e75d0676d56
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 9cab81a3869ce222583deb34c8de80fb
SHA-256: 157fe3a2937e88c28cf1205a0e4ce8288a77b8e1529f8d0d216e6cde38e91a89
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 1fd4ef312379992ee3db57614692841c
SHA-256: 94c36761c50cb9c3f85e59ab38c0abddc4cbb09b3a71ba691a16dc00a8c74d69
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 756690b0fae8345d3170e9d074e6ed01
SHA-256: f5039dcb899b50fead2c1c7139e734a9b8f1f626a1ddd0955d033532c379f4bf
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 734fe9d697f42adf55d57b01c59a631f
SHA-256: 80eae8304abc328bfbec43e7c00ce6ac6db8f596e513dfd364bae8c175409e5f
 
x86_64:
java-1.6.0-sun-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 37d5f477a4abc5003a9b0987c2bf84e7
SHA-256: 55148c6dd43e07fd6d0ba3f2c967e26b030f7cda0303ad63bc703a445d5b2f54
java-1.6.0-sun-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: e852b2b548358447bcff529f348db0b8
SHA-256: 74f251fd61725a13fc98acd10dd4e5c239cb2867d466221f4a1527e7c9a8ba34
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 57f15e45dd41b4bb44c5f9a071d09848
SHA-256: e32b005683dc553ae27dca6af801c2d6fb0776ec2ca1637ac0477e75d0676d56
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: 5795438e12b928dfd09ea23066c3e81b
SHA-256: 2aa631f0dcd971766f4e777db44c85d0b586a84b2209a526f09c9ca162cec1ef
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 9cab81a3869ce222583deb34c8de80fb
SHA-256: 157fe3a2937e88c28cf1205a0e4ce8288a77b8e1529f8d0d216e6cde38e91a89
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: e3011aef80eda6276ebde7cd35aac883
SHA-256: be1a83c5fc3c19825179f638d7b3101d4953ddb97f22fb3ec8e60054655a517d
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 1fd4ef312379992ee3db57614692841c
SHA-256: 94c36761c50cb9c3f85e59ab38c0abddc4cbb09b3a71ba691a16dc00a8c74d69
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: f728282ff0776e5fe321735d64ba11fd
SHA-256: 06ff5e9b527cfb3bb8d145474e87446bad90d3e9c20c987c7c9614affae1f3e7
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 756690b0fae8345d3170e9d074e6ed01
SHA-256: f5039dcb899b50fead2c1c7139e734a9b8f1f626a1ddd0955d033532c379f4bf
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: 907308d564c87047936cffcb71b7e48f
SHA-256: 570c48997b11104ad89acc586d8affca78d468b6c42d7d3fa0fbf1794556e779
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 734fe9d697f42adf55d57b01c59a631f
SHA-256: 80eae8304abc328bfbec43e7c00ce6ac6db8f596e513dfd364bae8c175409e5f
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: 554defafce48836861678eb994fa441e
SHA-256: 4037c8c0187c8cfed15291b2651569ef7e4608e4da211d933f200b49b19fb8ac
 
RHEL Supplementary (v. 5 server)

IA-32:
java-1.6.0-sun-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 37d5f477a4abc5003a9b0987c2bf84e7
SHA-256: 55148c6dd43e07fd6d0ba3f2c967e26b030f7cda0303ad63bc703a445d5b2f54
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 57f15e45dd41b4bb44c5f9a071d09848
SHA-256: e32b005683dc553ae27dca6af801c2d6fb0776ec2ca1637ac0477e75d0676d56
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 9cab81a3869ce222583deb34c8de80fb
SHA-256: 157fe3a2937e88c28cf1205a0e4ce8288a77b8e1529f8d0d216e6cde38e91a89
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 1fd4ef312379992ee3db57614692841c
SHA-256: 94c36761c50cb9c3f85e59ab38c0abddc4cbb09b3a71ba691a16dc00a8c74d69
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 756690b0fae8345d3170e9d074e6ed01
SHA-256: f5039dcb899b50fead2c1c7139e734a9b8f1f626a1ddd0955d033532c379f4bf
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 734fe9d697f42adf55d57b01c59a631f
SHA-256: 80eae8304abc328bfbec43e7c00ce6ac6db8f596e513dfd364bae8c175409e5f
 
x86_64:
java-1.6.0-sun-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 37d5f477a4abc5003a9b0987c2bf84e7
SHA-256: 55148c6dd43e07fd6d0ba3f2c967e26b030f7cda0303ad63bc703a445d5b2f54
java-1.6.0-sun-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: e852b2b548358447bcff529f348db0b8
SHA-256: 74f251fd61725a13fc98acd10dd4e5c239cb2867d466221f4a1527e7c9a8ba34
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 57f15e45dd41b4bb44c5f9a071d09848
SHA-256: e32b005683dc553ae27dca6af801c2d6fb0776ec2ca1637ac0477e75d0676d56
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: 5795438e12b928dfd09ea23066c3e81b
SHA-256: 2aa631f0dcd971766f4e777db44c85d0b586a84b2209a526f09c9ca162cec1ef
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 9cab81a3869ce222583deb34c8de80fb
SHA-256: 157fe3a2937e88c28cf1205a0e4ce8288a77b8e1529f8d0d216e6cde38e91a89
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: e3011aef80eda6276ebde7cd35aac883
SHA-256: be1a83c5fc3c19825179f638d7b3101d4953ddb97f22fb3ec8e60054655a517d
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 1fd4ef312379992ee3db57614692841c
SHA-256: 94c36761c50cb9c3f85e59ab38c0abddc4cbb09b3a71ba691a16dc00a8c74d69
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: f728282ff0776e5fe321735d64ba11fd
SHA-256: 06ff5e9b527cfb3bb8d145474e87446bad90d3e9c20c987c7c9614affae1f3e7
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 756690b0fae8345d3170e9d074e6ed01
SHA-256: f5039dcb899b50fead2c1c7139e734a9b8f1f626a1ddd0955d033532c379f4bf
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: 907308d564c87047936cffcb71b7e48f
SHA-256: 570c48997b11104ad89acc586d8affca78d468b6c42d7d3fa0fbf1794556e779
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el5_8.i586.rpm     MD5: 734fe9d697f42adf55d57b01c59a631f
SHA-256: 80eae8304abc328bfbec43e7c00ce6ac6db8f596e513dfd364bae8c175409e5f
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el5_8.x86_64.rpm     MD5: 554defafce48836861678eb994fa441e
SHA-256: 4037c8c0187c8cfed15291b2651569ef7e4608e4da211d933f200b49b19fb8ac
 
Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: e59eae5402fb57ca7377e6dbb0719f79
SHA-256: 8b2c81aa969a2e2b381f889b09118e1afb55d340b1149aa5b41159ff7110c543
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 9984d244a89d184f2f96aa3959624d8c
SHA-256: 5d43e9988c18d25bae80abf683489a8b89f730c0c9987f789d4e76ec14636e4d
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 573dde4dafa948e4ce5a578680db9aa1
SHA-256: b268b97734a2529fd80963a9d57f6b4565e63212a2cf8760601551847cfe23af
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: fd45569871c4e255f059c479d7fa416b
SHA-256: 93a61e0dbda1e849ff252ed4e99e96e5c15185613356b02a19926885bf9b0cb5
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: ab20dc0a4f9cfd12cb3761851c3e8749
SHA-256: 889bac28bbae731a0390a937c0ee78c4ff92b074c3a3ca6ce87fb44eda34586a
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: d1aa447196c1047303b165450a74bd8e
SHA-256: 483c8fe43120065ac4d66967c77881f5c8d9b9a55c06a8a6958aaeb714ad4da6
 
x86_64:
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: e59eae5402fb57ca7377e6dbb0719f79
SHA-256: 8b2c81aa969a2e2b381f889b09118e1afb55d340b1149aa5b41159ff7110c543
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 526a0c7f8c47a0381dfd96f119ab383d
SHA-256: 38d7c1fbea4befe0664592e0059c7e6ee01f4e89903bd69b7749df4fe3867d38
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 7b3e5c54946640bd19cfc17e5df226a6
SHA-256: e6e639e03d749d9754c8154d4e8eb767219fa4377c0dc2b5d7c71679ff01fd74
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 573dde4dafa948e4ce5a578680db9aa1
SHA-256: b268b97734a2529fd80963a9d57f6b4565e63212a2cf8760601551847cfe23af
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: f6888d858b669a951134fa3875b92c1d
SHA-256: eb86acf4364169abde3817d77bde7db8ca53f5c7f5a2452ef52fe76fe7731c44
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 99b5995eddc0901e5e4c12fa6ceab9e6
SHA-256: 849cc7721f5e92c2c92f84df487b9aa83fa5fb5f4469f2c70aebd1c5d44dcc83
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 2d787e00cb24ca115b325b36685854ee
SHA-256: 0b2567130dc76d36db401135f2083c93cf857e363efda31029db068b3e5b6e1b
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: c9f20e0df5e235e9cb4fd35a93a8fca1
SHA-256: f3db2ac91668063aa3bc054c30ad981fc536c80a6d5695ee1a359310a30b68c1
 
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)

x86_64:
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: e59eae5402fb57ca7377e6dbb0719f79
SHA-256: 8b2c81aa969a2e2b381f889b09118e1afb55d340b1149aa5b41159ff7110c543
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 526a0c7f8c47a0381dfd96f119ab383d
SHA-256: 38d7c1fbea4befe0664592e0059c7e6ee01f4e89903bd69b7749df4fe3867d38
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 7b3e5c54946640bd19cfc17e5df226a6
SHA-256: e6e639e03d749d9754c8154d4e8eb767219fa4377c0dc2b5d7c71679ff01fd74
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 573dde4dafa948e4ce5a578680db9aa1
SHA-256: b268b97734a2529fd80963a9d57f6b4565e63212a2cf8760601551847cfe23af
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: f6888d858b669a951134fa3875b92c1d
SHA-256: eb86acf4364169abde3817d77bde7db8ca53f5c7f5a2452ef52fe76fe7731c44
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: c9f20e0df5e235e9cb4fd35a93a8fca1
SHA-256: f3db2ac91668063aa3bc054c30ad981fc536c80a6d5695ee1a359310a30b68c1
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: e59eae5402fb57ca7377e6dbb0719f79
SHA-256: 8b2c81aa969a2e2b381f889b09118e1afb55d340b1149aa5b41159ff7110c543
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 9984d244a89d184f2f96aa3959624d8c
SHA-256: 5d43e9988c18d25bae80abf683489a8b89f730c0c9987f789d4e76ec14636e4d
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 573dde4dafa948e4ce5a578680db9aa1
SHA-256: b268b97734a2529fd80963a9d57f6b4565e63212a2cf8760601551847cfe23af
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: fd45569871c4e255f059c479d7fa416b
SHA-256: 93a61e0dbda1e849ff252ed4e99e96e5c15185613356b02a19926885bf9b0cb5
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: ab20dc0a4f9cfd12cb3761851c3e8749
SHA-256: 889bac28bbae731a0390a937c0ee78c4ff92b074c3a3ca6ce87fb44eda34586a
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: d1aa447196c1047303b165450a74bd8e
SHA-256: 483c8fe43120065ac4d66967c77881f5c8d9b9a55c06a8a6958aaeb714ad4da6
 
x86_64:
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: e59eae5402fb57ca7377e6dbb0719f79
SHA-256: 8b2c81aa969a2e2b381f889b09118e1afb55d340b1149aa5b41159ff7110c543
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 526a0c7f8c47a0381dfd96f119ab383d
SHA-256: 38d7c1fbea4befe0664592e0059c7e6ee01f4e89903bd69b7749df4fe3867d38
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 7b3e5c54946640bd19cfc17e5df226a6
SHA-256: e6e639e03d749d9754c8154d4e8eb767219fa4377c0dc2b5d7c71679ff01fd74
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 573dde4dafa948e4ce5a578680db9aa1
SHA-256: b268b97734a2529fd80963a9d57f6b4565e63212a2cf8760601551847cfe23af
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: f6888d858b669a951134fa3875b92c1d
SHA-256: eb86acf4364169abde3817d77bde7db8ca53f5c7f5a2452ef52fe76fe7731c44
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 99b5995eddc0901e5e4c12fa6ceab9e6
SHA-256: 849cc7721f5e92c2c92f84df487b9aa83fa5fb5f4469f2c70aebd1c5d44dcc83
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 2d787e00cb24ca115b325b36685854ee
SHA-256: 0b2567130dc76d36db401135f2083c93cf857e363efda31029db068b3e5b6e1b
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: c9f20e0df5e235e9cb4fd35a93a8fca1
SHA-256: f3db2ac91668063aa3bc054c30ad981fc536c80a6d5695ee1a359310a30b68c1
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.3.z)

IA-32:
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: e59eae5402fb57ca7377e6dbb0719f79
SHA-256: 8b2c81aa969a2e2b381f889b09118e1afb55d340b1149aa5b41159ff7110c543
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: 9984d244a89d184f2f96aa3959624d8c
SHA-256: 5d43e9988c18d25bae80abf683489a8b89f730c0c9987f789d4e76ec14636e4d
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: 573dde4dafa948e4ce5a578680db9aa1
SHA-256: b268b97734a2529fd80963a9d57f6b4565e63212a2cf8760601551847cfe23af
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: fd45569871c4e255f059c479d7fa416b
SHA-256: 93a61e0dbda1e849ff252ed4e99e96e5c15185613356b02a19926885bf9b0cb5
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: ab20dc0a4f9cfd12cb3761851c3e8749
SHA-256: 889bac28bbae731a0390a937c0ee78c4ff92b074c3a3ca6ce87fb44eda34586a
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: d1aa447196c1047303b165450a74bd8e
SHA-256: 483c8fe43120065ac4d66967c77881f5c8d9b9a55c06a8a6958aaeb714ad4da6
 
x86_64:
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: e59eae5402fb57ca7377e6dbb0719f79
SHA-256: 8b2c81aa969a2e2b381f889b09118e1afb55d340b1149aa5b41159ff7110c543
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: 526a0c7f8c47a0381dfd96f119ab383d
SHA-256: 38d7c1fbea4befe0664592e0059c7e6ee01f4e89903bd69b7749df4fe3867d38
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: 7b3e5c54946640bd19cfc17e5df226a6
SHA-256: e6e639e03d749d9754c8154d4e8eb767219fa4377c0dc2b5d7c71679ff01fd74
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: 573dde4dafa948e4ce5a578680db9aa1
SHA-256: b268b97734a2529fd80963a9d57f6b4565e63212a2cf8760601551847cfe23af
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: f6888d858b669a951134fa3875b92c1d
SHA-256: eb86acf4364169abde3817d77bde7db8ca53f5c7f5a2452ef52fe76fe7731c44
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: 99b5995eddc0901e5e4c12fa6ceab9e6
SHA-256: 849cc7721f5e92c2c92f84df487b9aa83fa5fb5f4469f2c70aebd1c5d44dcc83
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: 2d787e00cb24ca115b325b36685854ee
SHA-256: 0b2567130dc76d36db401135f2083c93cf857e363efda31029db068b3e5b6e1b
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: c9f20e0df5e235e9cb4fd35a93a8fca1
SHA-256: f3db2ac91668063aa3bc054c30ad981fc536c80a6d5695ee1a359310a30b68c1
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: e59eae5402fb57ca7377e6dbb0719f79
SHA-256: 8b2c81aa969a2e2b381f889b09118e1afb55d340b1149aa5b41159ff7110c543
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 9984d244a89d184f2f96aa3959624d8c
SHA-256: 5d43e9988c18d25bae80abf683489a8b89f730c0c9987f789d4e76ec14636e4d
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 573dde4dafa948e4ce5a578680db9aa1
SHA-256: b268b97734a2529fd80963a9d57f6b4565e63212a2cf8760601551847cfe23af
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: fd45569871c4e255f059c479d7fa416b
SHA-256: 93a61e0dbda1e849ff252ed4e99e96e5c15185613356b02a19926885bf9b0cb5
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: ab20dc0a4f9cfd12cb3761851c3e8749
SHA-256: 889bac28bbae731a0390a937c0ee78c4ff92b074c3a3ca6ce87fb44eda34586a
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: d1aa447196c1047303b165450a74bd8e
SHA-256: 483c8fe43120065ac4d66967c77881f5c8d9b9a55c06a8a6958aaeb714ad4da6
 
x86_64:
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: e59eae5402fb57ca7377e6dbb0719f79
SHA-256: 8b2c81aa969a2e2b381f889b09118e1afb55d340b1149aa5b41159ff7110c543
java-1.6.0-sun-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 526a0c7f8c47a0381dfd96f119ab383d
SHA-256: 38d7c1fbea4befe0664592e0059c7e6ee01f4e89903bd69b7749df4fe3867d38
java-1.6.0-sun-demo-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 7b3e5c54946640bd19cfc17e5df226a6
SHA-256: e6e639e03d749d9754c8154d4e8eb767219fa4377c0dc2b5d7c71679ff01fd74
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 573dde4dafa948e4ce5a578680db9aa1
SHA-256: b268b97734a2529fd80963a9d57f6b4565e63212a2cf8760601551847cfe23af
java-1.6.0-sun-devel-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: f6888d858b669a951134fa3875b92c1d
SHA-256: eb86acf4364169abde3817d77bde7db8ca53f5c7f5a2452ef52fe76fe7731c44
java-1.6.0-sun-jdbc-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 99b5995eddc0901e5e4c12fa6ceab9e6
SHA-256: 849cc7721f5e92c2c92f84df487b9aa83fa5fb5f4469f2c70aebd1c5d44dcc83
java-1.6.0-sun-plugin-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 2d787e00cb24ca115b325b36685854ee
SHA-256: 0b2567130dc76d36db401135f2083c93cf857e363efda31029db068b3e5b6e1b
java-1.6.0-sun-src-1.6.0.37-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: c9f20e0df5e235e9cb4fd35a93a8fca1
SHA-256: f3db2ac91668063aa3bc054c30ad981fc536c80a6d5695ee1a359310a30b68c1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

853228 - CVE-2012-0547 OpenJDK: AWT hardening fixes (AWT, 7163201)
856124 - CVE-2012-4416 OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606)
865346 - CVE-2012-3216 OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)
865348 - CVE-2012-5068 OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)
865354 - CVE-2012-5077 OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656)
865357 - CVE-2012-5073 OpenJDK: LogManager security bypass (Libraries, 7169884)
865363 - CVE-2012-5075 OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)
865365 - CVE-2012-5072 OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)
865370 - CVE-2012-5081 OpenJDK: JSSE denial of service (JSSE, 7186286)
865428 - CVE-2012-5086 OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917)
865511 - CVE-2012-5084 OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)
865514 - CVE-2012-5089 OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)
865519 - CVE-2012-5071 OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)
865531 - CVE-2012-5069 OpenJDK: Executors state handling issues (Concurrency, 7189103)
865541 - CVE-2012-5085 OpenJDK: disable Gopher support by default (Gopher, 7189567)
865568 - CVE-2012-5079 OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)
867185 - CVE-2012-1531 Oracle JDK: unspecified vulnerability (2D)
867186 - CVE-2012-1532 Oracle JDK: unspecified vulnerability (Deployment)
867187 - CVE-2012-1533 Oracle JDK: unspecified vulnerability (Deployment)
867189 - CVE-2012-3143 Oracle JDK: unspecified vulnerability (JMX)
867190 - CVE-2012-3159 Oracle JDK: unspecified vulnerability (Deployment)
867193 - CVE-2012-5083 Oracle JDK: unspecified vulnerability (2D)


References

https://www.redhat.com/security/data/cve/CVE-2012-0547.html
https://www.redhat.com/security/data/cve/CVE-2012-1531.html
https://www.redhat.com/security/data/cve/CVE-2012-1532.html
https://www.redhat.com/security/data/cve/CVE-2012-1533.html
https://www.redhat.com/security/data/cve/CVE-2012-3143.html
https://www.redhat.com/security/data/cve/CVE-2012-3159.html
https://www.redhat.com/security/data/cve/CVE-2012-3216.html
https://www.redhat.com/security/data/cve/CVE-2012-4416.html
https://www.redhat.com/security/data/cve/CVE-2012-5068.html
https://www.redhat.com/security/data/cve/CVE-2012-5069.html
https://www.redhat.com/security/data/cve/CVE-2012-5071.html
https://www.redhat.com/security/data/cve/CVE-2012-5072.html
https://www.redhat.com/security/data/cve/CVE-2012-5073.html
https://www.redhat.com/security/data/cve/CVE-2012-5075.html
https://www.redhat.com/security/data/cve/CVE-2012-5077.html
https://www.redhat.com/security/data/cve/CVE-2012-5079.html
https://www.redhat.com/security/data/cve/CVE-2012-5081.html
https://www.redhat.com/security/data/cve/CVE-2012-5083.html
https://www.redhat.com/security/data/cve/CVE-2012-5084.html
https://www.redhat.com/security/data/cve/CVE-2012-5085.html
https://www.redhat.com/security/data/cve/CVE-2012-5086.html
https://www.redhat.com/security/data/cve/CVE-2012-5089.html
https://access.redhat.com/security/updates/classification/#critical
http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/