Skip to navigation

Security Advisory Critical: java-1.6.0-sun security update

Advisory: RHSA-2013:0758-4
Type: Security Advisory
Severity: Critical
Issued on: 2013-04-18
Last updated on: 2013-04-18
Affected Products: RHEL Supplementary EUS (v. 5.9.z server)
RHEL Supplementary Long Life (v. 5.9 server)
Red Hat Enterprise Linux Desktop Supplementary (v. 6)
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary AUS (v. 6.4)
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.4.z)
Red Hat Enterprise Linux Workstation Supplementary (v. 6)
CVEs (cve.mitre.org): CVE-2013-0401
CVE-2013-1491
CVE-2013-1518
CVE-2013-1537
CVE-2013-1540
CVE-2013-1557
CVE-2013-1558
CVE-2013-1563
CVE-2013-1569
CVE-2013-2383
CVE-2013-2384
CVE-2013-2394
CVE-2013-2417
CVE-2013-2418
CVE-2013-2419
CVE-2013-2420
CVE-2013-2422
CVE-2013-2424
CVE-2013-2429
CVE-2013-2430
CVE-2013-2432
CVE-2013-2433
CVE-2013-2435
CVE-2013-2439
CVE-2013-2440

Details

Updated java-1.6.0-sun packages that fix several security issues are now
available for Red Hat Enterprise Linux 5 and 6 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Oracle Java SE version 6 includes the Oracle Java Runtime Environment and
the Oracle Java Software Development Kit.

This update fixes several vulnerabilities in the Oracle Java Runtime
Environment and the Oracle Java Software Development Kit. Further
information about these flaws can be found on the Oracle Java SE Critical
Patch Update Advisory page, listed in the References section.
(CVE-2013-0401, CVE-2013-1491, CVE-2013-1518, CVE-2013-1537, CVE-2013-1540,
CVE-2013-1557, CVE-2013-1558, CVE-2013-1563, CVE-2013-1569, CVE-2013-2383,
CVE-2013-2384, CVE-2013-2394, CVE-2013-2417, CVE-2013-2418, CVE-2013-2419,
CVE-2013-2420, CVE-2013-2422, CVE-2013-2424, CVE-2013-2429, CVE-2013-2430,
CVE-2013-2432, CVE-2013-2433, CVE-2013-2435, CVE-2013-2439, CVE-2013-2440)

All users of java-1.6.0-sun are advised to upgrade to these updated
packages, which provide Oracle Java 6 Update 45. All running instances of
Oracle Java must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Supplementary EUS (v. 5.9.z server)

IA-32:
java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 0b1d5a5634efafa8ec3bf516336143c9
SHA-256: ef41f30b5d6f2bb8781ad2c03b8325aad5abcb0c5622b201127ea5f1f0a85406
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: e5be533001050e8ef79a8794b8a428ef
SHA-256: 8750d15b7504a84c3fad3ecc37ac148cd90bc42c8ed86157c8257f4019658227
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: cb7e29670f22f173c5363092f7bb1095
SHA-256: 3b4e6ff7d113ab9364ac966adacb44f546dbd0c649697715fef582bf3d6ff98b
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: a2ce3e755c6e33f042215f485ae6d761
SHA-256: f2733b0f082b4570bdecfb33ccb7d5be30642a3bbd86547e39210e877f2eabb6
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 19a693b8acfab0284ca009bdcb621702
SHA-256: 854daaa60d1cf5431b894caf7984d00f9fa07a7046001bf0659f15e87d581b8d
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 51054d9516a45d4984869263ff5e9cfb
SHA-256: c88a8fb2b1d98ff24008864bb5159c77bb7b2401431549690d5dd44bb9d92520
 
x86_64:
java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 0b1d5a5634efafa8ec3bf516336143c9
SHA-256: ef41f30b5d6f2bb8781ad2c03b8325aad5abcb0c5622b201127ea5f1f0a85406
java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: 4f6bcbed3e5e5351bd683bb9f884c4f2
SHA-256: 065621f930568f36aba954b848b656c3b8009e822cb0c77bf9ae029a52d9fbdf
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: e5be533001050e8ef79a8794b8a428ef
SHA-256: 8750d15b7504a84c3fad3ecc37ac148cd90bc42c8ed86157c8257f4019658227
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: bea360de4c5def414e0dde777a2b0000
SHA-256: cf78ad0940f2866f788a0cf5bc5b231e03ee8ccfb544d58cdc58f7d55b08e787
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: cb7e29670f22f173c5363092f7bb1095
SHA-256: 3b4e6ff7d113ab9364ac966adacb44f546dbd0c649697715fef582bf3d6ff98b
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: 7e89e06f198a3f487095b9c995adad61
SHA-256: c1efda5689952ea36e16352e22e774183ea2516c925716059becd7210056379f
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: a2ce3e755c6e33f042215f485ae6d761
SHA-256: f2733b0f082b4570bdecfb33ccb7d5be30642a3bbd86547e39210e877f2eabb6
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: 78fa4cc1108d5fbae22214238dbf038c
SHA-256: cebf371d2e7ec0c2849446a683146d609de8c8d6743b3bb0b33decb0b4e9fb17
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 19a693b8acfab0284ca009bdcb621702
SHA-256: 854daaa60d1cf5431b894caf7984d00f9fa07a7046001bf0659f15e87d581b8d
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: 70fedf3c59ca2f3157f3864474994c81
SHA-256: d59ee840551cac23dd8834d71fbfd7d74cd1139c79ad5249f096ffbcdfc0d01f
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 51054d9516a45d4984869263ff5e9cfb
SHA-256: c88a8fb2b1d98ff24008864bb5159c77bb7b2401431549690d5dd44bb9d92520
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: 10bd92a55a9e27e28a42ae9d629d3556
SHA-256: c6ee84a0d9e5e1f950bbe75f35aa3aef3e3b043c441ed24c16d0bff752703f86
 
RHEL Supplementary Long Life (v. 5.9 server)

IA-32:
java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 0b1d5a5634efafa8ec3bf516336143c9
SHA-256: ef41f30b5d6f2bb8781ad2c03b8325aad5abcb0c5622b201127ea5f1f0a85406
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: e5be533001050e8ef79a8794b8a428ef
SHA-256: 8750d15b7504a84c3fad3ecc37ac148cd90bc42c8ed86157c8257f4019658227
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: cb7e29670f22f173c5363092f7bb1095
SHA-256: 3b4e6ff7d113ab9364ac966adacb44f546dbd0c649697715fef582bf3d6ff98b
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: a2ce3e755c6e33f042215f485ae6d761
SHA-256: f2733b0f082b4570bdecfb33ccb7d5be30642a3bbd86547e39210e877f2eabb6
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 19a693b8acfab0284ca009bdcb621702
SHA-256: 854daaa60d1cf5431b894caf7984d00f9fa07a7046001bf0659f15e87d581b8d
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 51054d9516a45d4984869263ff5e9cfb
SHA-256: c88a8fb2b1d98ff24008864bb5159c77bb7b2401431549690d5dd44bb9d92520
 
x86_64:
java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 0b1d5a5634efafa8ec3bf516336143c9
SHA-256: ef41f30b5d6f2bb8781ad2c03b8325aad5abcb0c5622b201127ea5f1f0a85406
java-1.6.0-sun-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: 4f6bcbed3e5e5351bd683bb9f884c4f2
SHA-256: 065621f930568f36aba954b848b656c3b8009e822cb0c77bf9ae029a52d9fbdf
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: e5be533001050e8ef79a8794b8a428ef
SHA-256: 8750d15b7504a84c3fad3ecc37ac148cd90bc42c8ed86157c8257f4019658227
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: bea360de4c5def414e0dde777a2b0000
SHA-256: cf78ad0940f2866f788a0cf5bc5b231e03ee8ccfb544d58cdc58f7d55b08e787
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: cb7e29670f22f173c5363092f7bb1095
SHA-256: 3b4e6ff7d113ab9364ac966adacb44f546dbd0c649697715fef582bf3d6ff98b
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: 7e89e06f198a3f487095b9c995adad61
SHA-256: c1efda5689952ea36e16352e22e774183ea2516c925716059becd7210056379f
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: a2ce3e755c6e33f042215f485ae6d761
SHA-256: f2733b0f082b4570bdecfb33ccb7d5be30642a3bbd86547e39210e877f2eabb6
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: 78fa4cc1108d5fbae22214238dbf038c
SHA-256: cebf371d2e7ec0c2849446a683146d609de8c8d6743b3bb0b33decb0b4e9fb17
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 19a693b8acfab0284ca009bdcb621702
SHA-256: 854daaa60d1cf5431b894caf7984d00f9fa07a7046001bf0659f15e87d581b8d
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: 70fedf3c59ca2f3157f3864474994c81
SHA-256: d59ee840551cac23dd8834d71fbfd7d74cd1139c79ad5249f096ffbcdfc0d01f
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.i586.rpm     MD5: 51054d9516a45d4984869263ff5e9cfb
SHA-256: c88a8fb2b1d98ff24008864bb5159c77bb7b2401431549690d5dd44bb9d92520
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el5_9.x86_64.rpm     MD5: 10bd92a55a9e27e28a42ae9d629d3556
SHA-256: c6ee84a0d9e5e1f950bbe75f35aa3aef3e3b043c441ed24c16d0bff752703f86
 
Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 8d106e2df85b59174b854849db4e264b
SHA-256: 37ed0debcd515587b2f44a6b1660c035d04ee43a040a810e226a0937340392b4
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 629cd83ddbcc9f812dea4a0e6b78f8b8
SHA-256: 91ee78fea6eca211271cdcf60fc316946e412428fceb3156b92834372a525d06
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 08ad24eccf769209ce26610318981006
SHA-256: 3570201b64d9adfc1d89968afda068a87d126878dbfced65587c978ebc04315f
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 89c202b706277f0f290c784967ceef71
SHA-256: 850a2d3b0af2e706ad1018572fdd77a27a790f04481ed5eb24f82433e15cafd0
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 1ca6b570ab702759219b1989d94fe22a
SHA-256: 6a7c67f22d91bd2918da83c197a0912ab4e11c454b352ec7a26afa2a3c60325b
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: acb45f8dfdebb7991143d64215b7b4c2
SHA-256: ab3cc742d2c2a85afbd6eaf68a72c341f6a856dcaa1b49a7b68f5851e128cd94
 
x86_64:
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 8d106e2df85b59174b854849db4e264b
SHA-256: 37ed0debcd515587b2f44a6b1660c035d04ee43a040a810e226a0937340392b4
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ec65b275f87dc9c49faade9e6d9d1bdf
SHA-256: 5f07f9ce82ea8ae5951f0957f6d2490928a68f5833d9956afc0cc9bc27b9c39d
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ab01e1584a69c6580d4a67d2d835f807
SHA-256: 5827ca23e1772fdb13d0804199b18d6302d852113a609a60475d814a0a8b12be
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 08ad24eccf769209ce26610318981006
SHA-256: 3570201b64d9adfc1d89968afda068a87d126878dbfced65587c978ebc04315f
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: 9c43e8413d0f0d3a7e84b16f8e18acaa
SHA-256: 96edbac4eba6de8a3a1d475780f8e4772b6b42037166834a055c1bafd77ff94d
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: c32d21caee3dbfa171be27cb4381bc8a
SHA-256: c4a69ea244b93a3e2e133785b172876c580c48c17db354dde0c166aca576f096
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: 70314d1476bdfa9bd29eba30e788fcd2
SHA-256: 19561e285bb40e3e443dab2c8add0649c56ccaad822dacd8da39e821d3c5e5f0
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: e1705604cb7deffc6d9bf6c77e2781bf
SHA-256: 4df37f59b1703e9c35f2c44fe4facef409d10e850b976681f2f7bdf9c8505248
 
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)

x86_64:
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 8d106e2df85b59174b854849db4e264b
SHA-256: 37ed0debcd515587b2f44a6b1660c035d04ee43a040a810e226a0937340392b4
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ec65b275f87dc9c49faade9e6d9d1bdf
SHA-256: 5f07f9ce82ea8ae5951f0957f6d2490928a68f5833d9956afc0cc9bc27b9c39d
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ab01e1584a69c6580d4a67d2d835f807
SHA-256: 5827ca23e1772fdb13d0804199b18d6302d852113a609a60475d814a0a8b12be
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 08ad24eccf769209ce26610318981006
SHA-256: 3570201b64d9adfc1d89968afda068a87d126878dbfced65587c978ebc04315f
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: 9c43e8413d0f0d3a7e84b16f8e18acaa
SHA-256: 96edbac4eba6de8a3a1d475780f8e4772b6b42037166834a055c1bafd77ff94d
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: e1705604cb7deffc6d9bf6c77e2781bf
SHA-256: 4df37f59b1703e9c35f2c44fe4facef409d10e850b976681f2f7bdf9c8505248
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 8d106e2df85b59174b854849db4e264b
SHA-256: 37ed0debcd515587b2f44a6b1660c035d04ee43a040a810e226a0937340392b4
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 629cd83ddbcc9f812dea4a0e6b78f8b8
SHA-256: 91ee78fea6eca211271cdcf60fc316946e412428fceb3156b92834372a525d06
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 08ad24eccf769209ce26610318981006
SHA-256: 3570201b64d9adfc1d89968afda068a87d126878dbfced65587c978ebc04315f
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 89c202b706277f0f290c784967ceef71
SHA-256: 850a2d3b0af2e706ad1018572fdd77a27a790f04481ed5eb24f82433e15cafd0
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 1ca6b570ab702759219b1989d94fe22a
SHA-256: 6a7c67f22d91bd2918da83c197a0912ab4e11c454b352ec7a26afa2a3c60325b
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: acb45f8dfdebb7991143d64215b7b4c2
SHA-256: ab3cc742d2c2a85afbd6eaf68a72c341f6a856dcaa1b49a7b68f5851e128cd94
 
x86_64:
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 8d106e2df85b59174b854849db4e264b
SHA-256: 37ed0debcd515587b2f44a6b1660c035d04ee43a040a810e226a0937340392b4
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ec65b275f87dc9c49faade9e6d9d1bdf
SHA-256: 5f07f9ce82ea8ae5951f0957f6d2490928a68f5833d9956afc0cc9bc27b9c39d
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ab01e1584a69c6580d4a67d2d835f807
SHA-256: 5827ca23e1772fdb13d0804199b18d6302d852113a609a60475d814a0a8b12be
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 08ad24eccf769209ce26610318981006
SHA-256: 3570201b64d9adfc1d89968afda068a87d126878dbfced65587c978ebc04315f
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: 9c43e8413d0f0d3a7e84b16f8e18acaa
SHA-256: 96edbac4eba6de8a3a1d475780f8e4772b6b42037166834a055c1bafd77ff94d
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: c32d21caee3dbfa171be27cb4381bc8a
SHA-256: c4a69ea244b93a3e2e133785b172876c580c48c17db354dde0c166aca576f096
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: 70314d1476bdfa9bd29eba30e788fcd2
SHA-256: 19561e285bb40e3e443dab2c8add0649c56ccaad822dacd8da39e821d3c5e5f0
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: e1705604cb7deffc6d9bf6c77e2781bf
SHA-256: 4df37f59b1703e9c35f2c44fe4facef409d10e850b976681f2f7bdf9c8505248
 
Red Hat Enterprise Linux Server Supplementary AUS (v. 6.4)

x86_64:
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 8d106e2df85b59174b854849db4e264b
SHA-256: 37ed0debcd515587b2f44a6b1660c035d04ee43a040a810e226a0937340392b4
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ec65b275f87dc9c49faade9e6d9d1bdf
SHA-256: 5f07f9ce82ea8ae5951f0957f6d2490928a68f5833d9956afc0cc9bc27b9c39d
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ab01e1584a69c6580d4a67d2d835f807
SHA-256: 5827ca23e1772fdb13d0804199b18d6302d852113a609a60475d814a0a8b12be
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 08ad24eccf769209ce26610318981006
SHA-256: 3570201b64d9adfc1d89968afda068a87d126878dbfced65587c978ebc04315f
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: 9c43e8413d0f0d3a7e84b16f8e18acaa
SHA-256: 96edbac4eba6de8a3a1d475780f8e4772b6b42037166834a055c1bafd77ff94d
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: c32d21caee3dbfa171be27cb4381bc8a
SHA-256: c4a69ea244b93a3e2e133785b172876c580c48c17db354dde0c166aca576f096
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: 70314d1476bdfa9bd29eba30e788fcd2
SHA-256: 19561e285bb40e3e443dab2c8add0649c56ccaad822dacd8da39e821d3c5e5f0
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: e1705604cb7deffc6d9bf6c77e2781bf
SHA-256: 4df37f59b1703e9c35f2c44fe4facef409d10e850b976681f2f7bdf9c8505248
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.4.z)

IA-32:
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 8d106e2df85b59174b854849db4e264b
SHA-256: 37ed0debcd515587b2f44a6b1660c035d04ee43a040a810e226a0937340392b4
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 629cd83ddbcc9f812dea4a0e6b78f8b8
SHA-256: 91ee78fea6eca211271cdcf60fc316946e412428fceb3156b92834372a525d06
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 08ad24eccf769209ce26610318981006
SHA-256: 3570201b64d9adfc1d89968afda068a87d126878dbfced65587c978ebc04315f
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 89c202b706277f0f290c784967ceef71
SHA-256: 850a2d3b0af2e706ad1018572fdd77a27a790f04481ed5eb24f82433e15cafd0
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 1ca6b570ab702759219b1989d94fe22a
SHA-256: 6a7c67f22d91bd2918da83c197a0912ab4e11c454b352ec7a26afa2a3c60325b
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: acb45f8dfdebb7991143d64215b7b4c2
SHA-256: ab3cc742d2c2a85afbd6eaf68a72c341f6a856dcaa1b49a7b68f5851e128cd94
 
x86_64:
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 8d106e2df85b59174b854849db4e264b
SHA-256: 37ed0debcd515587b2f44a6b1660c035d04ee43a040a810e226a0937340392b4
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ec65b275f87dc9c49faade9e6d9d1bdf
SHA-256: 5f07f9ce82ea8ae5951f0957f6d2490928a68f5833d9956afc0cc9bc27b9c39d
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ab01e1584a69c6580d4a67d2d835f807
SHA-256: 5827ca23e1772fdb13d0804199b18d6302d852113a609a60475d814a0a8b12be
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 08ad24eccf769209ce26610318981006
SHA-256: 3570201b64d9adfc1d89968afda068a87d126878dbfced65587c978ebc04315f
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: 9c43e8413d0f0d3a7e84b16f8e18acaa
SHA-256: 96edbac4eba6de8a3a1d475780f8e4772b6b42037166834a055c1bafd77ff94d
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: c32d21caee3dbfa171be27cb4381bc8a
SHA-256: c4a69ea244b93a3e2e133785b172876c580c48c17db354dde0c166aca576f096
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: 70314d1476bdfa9bd29eba30e788fcd2
SHA-256: 19561e285bb40e3e443dab2c8add0649c56ccaad822dacd8da39e821d3c5e5f0
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: e1705604cb7deffc6d9bf6c77e2781bf
SHA-256: 4df37f59b1703e9c35f2c44fe4facef409d10e850b976681f2f7bdf9c8505248
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 8d106e2df85b59174b854849db4e264b
SHA-256: 37ed0debcd515587b2f44a6b1660c035d04ee43a040a810e226a0937340392b4
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 629cd83ddbcc9f812dea4a0e6b78f8b8
SHA-256: 91ee78fea6eca211271cdcf60fc316946e412428fceb3156b92834372a525d06
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 08ad24eccf769209ce26610318981006
SHA-256: 3570201b64d9adfc1d89968afda068a87d126878dbfced65587c978ebc04315f
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 89c202b706277f0f290c784967ceef71
SHA-256: 850a2d3b0af2e706ad1018572fdd77a27a790f04481ed5eb24f82433e15cafd0
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 1ca6b570ab702759219b1989d94fe22a
SHA-256: 6a7c67f22d91bd2918da83c197a0912ab4e11c454b352ec7a26afa2a3c60325b
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: acb45f8dfdebb7991143d64215b7b4c2
SHA-256: ab3cc742d2c2a85afbd6eaf68a72c341f6a856dcaa1b49a7b68f5851e128cd94
 
x86_64:
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 8d106e2df85b59174b854849db4e264b
SHA-256: 37ed0debcd515587b2f44a6b1660c035d04ee43a040a810e226a0937340392b4
java-1.6.0-sun-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ec65b275f87dc9c49faade9e6d9d1bdf
SHA-256: 5f07f9ce82ea8ae5951f0957f6d2490928a68f5833d9956afc0cc9bc27b9c39d
java-1.6.0-sun-demo-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: ab01e1584a69c6580d4a67d2d835f807
SHA-256: 5827ca23e1772fdb13d0804199b18d6302d852113a609a60475d814a0a8b12be
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.i686.rpm     MD5: 08ad24eccf769209ce26610318981006
SHA-256: 3570201b64d9adfc1d89968afda068a87d126878dbfced65587c978ebc04315f
java-1.6.0-sun-devel-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: 9c43e8413d0f0d3a7e84b16f8e18acaa
SHA-256: 96edbac4eba6de8a3a1d475780f8e4772b6b42037166834a055c1bafd77ff94d
java-1.6.0-sun-jdbc-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: c32d21caee3dbfa171be27cb4381bc8a
SHA-256: c4a69ea244b93a3e2e133785b172876c580c48c17db354dde0c166aca576f096
java-1.6.0-sun-plugin-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: 70314d1476bdfa9bd29eba30e788fcd2
SHA-256: 19561e285bb40e3e443dab2c8add0649c56ccaad822dacd8da39e821d3c5e5f0
java-1.6.0-sun-src-1.6.0.45-1jpp.1.el6.x86_64.rpm     MD5: e1705604cb7deffc6d9bf6c77e2781bf
SHA-256: 4df37f59b1703e9c35f2c44fe4facef409d10e850b976681f2f7bdf9c8505248
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

920245 - CVE-2013-0401 OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)
920248 - CVE-2013-1491 Oracle JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)
952387 - CVE-2013-1537 OpenJDK: remote code loading enabled by default (RMI, 8001040)
952509 - CVE-2013-2424 OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)
952521 - CVE-2013-2429 OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)
952524 - CVE-2013-2430 OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)
952638 - CVE-2013-2420 OpenJDK: image processing vulnerability (2D, 8007617)
952640 - CVE-2013-1558 OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507)
952642 - CVE-2013-2422 OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)
952646 - CVE-2013-1518 OpenJDK: JAXP missing security restrictions (JAXP, 6657673)
952648 - CVE-2013-1557 OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)
952656 - CVE-2013-2419 ICU: Layout Engine font processing errors (JDK 2D, 8001031)
952657 - CVE-2013-2417 OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)
952708 - CVE-2013-2383 ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)
952709 - CVE-2013-2384 ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)
952711 - CVE-2013-1569 ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)
953166 - CVE-2013-1540 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)
953172 - CVE-2013-1563 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)
953265 - CVE-2013-2394 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)
953267 - CVE-2013-2418 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)
953269 - CVE-2013-2432 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)
953270 - CVE-2013-2433 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)
953273 - CVE-2013-2435 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)
953274 - CVE-2013-2439 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)
953275 - CVE-2013-2440 Oracle JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)


References

https://www.redhat.com/security/data/cve/CVE-2013-0401.html
https://www.redhat.com/security/data/cve/CVE-2013-1491.html
https://www.redhat.com/security/data/cve/CVE-2013-1518.html
https://www.redhat.com/security/data/cve/CVE-2013-1537.html
https://www.redhat.com/security/data/cve/CVE-2013-1540.html
https://www.redhat.com/security/data/cve/CVE-2013-1557.html
https://www.redhat.com/security/data/cve/CVE-2013-1558.html
https://www.redhat.com/security/data/cve/CVE-2013-1563.html
https://www.redhat.com/security/data/cve/CVE-2013-1569.html
https://www.redhat.com/security/data/cve/CVE-2013-2383.html
https://www.redhat.com/security/data/cve/CVE-2013-2384.html
https://www.redhat.com/security/data/cve/CVE-2013-2394.html
https://www.redhat.com/security/data/cve/CVE-2013-2417.html
https://www.redhat.com/security/data/cve/CVE-2013-2418.html
https://www.redhat.com/security/data/cve/CVE-2013-2419.html
https://www.redhat.com/security/data/cve/CVE-2013-2420.html
https://www.redhat.com/security/data/cve/CVE-2013-2422.html
https://www.redhat.com/security/data/cve/CVE-2013-2424.html
https://www.redhat.com/security/data/cve/CVE-2013-2429.html
https://www.redhat.com/security/data/cve/CVE-2013-2430.html
https://www.redhat.com/security/data/cve/CVE-2013-2432.html
https://www.redhat.com/security/data/cve/CVE-2013-2433.html
https://www.redhat.com/security/data/cve/CVE-2013-2435.html
https://www.redhat.com/security/data/cve/CVE-2013-2439.html
https://www.redhat.com/security/data/cve/CVE-2013-2440.html
https://access.redhat.com/security/updates/classification/#critical
http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/