Skip to navigation

Security Advisory Important: java-1.6.0-openjdk security update

Advisory: RHSA-2013:1014-1
Type: Security Advisory
Severity: Important
Issued on: 2013-07-03
Last updated on: 2013-07-03
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux EUS (v. 5.9.z server)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Long Life (v. 5.9 server)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.4)
Red Hat Enterprise Linux Server EUS (v. 6.4.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2013-1500
CVE-2013-1571
CVE-2013-2407
CVE-2013-2412
CVE-2013-2443
CVE-2013-2444
CVE-2013-2445
CVE-2013-2446
CVE-2013-2447
CVE-2013-2448
CVE-2013-2450
CVE-2013-2452
CVE-2013-2453
CVE-2013-2455
CVE-2013-2456
CVE-2013-2457
CVE-2013-2459
CVE-2013-2461
CVE-2013-2463
CVE-2013-2465
CVE-2013-2469
CVE-2013-2470
CVE-2013-2471
CVE-2013-2472
CVE-2013-2473

Details

Updated java-1.6.0-openjdk packages that fix various security issues are
now available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

These packages provide the OpenJDK 6 Java Runtime Environment and the
OpenJDK 6 Software Development Kit.

Multiple flaws were discovered in the ImagingLib and the image attribute,
channel, layout and raster processing in the 2D component. An untrusted
Java application or applet could possibly use these flaws to trigger Java
Virtual Machine memory corruption. (CVE-2013-2470, CVE-2013-2471,
CVE-2013-2472, CVE-2013-2473, CVE-2013-2463, CVE-2013-2465, CVE-2013-2469)

Integer overflow flaws were found in the way AWT processed certain input.
An attacker could use these flaws to execute arbitrary code with the
privileges of the user running an untrusted Java applet or application.
(CVE-2013-2459)

Multiple improper permission check issues were discovered in the Sound and
JMX components in OpenJDK. An untrusted Java application or applet could
use these flaws to bypass Java sandbox restrictions. (CVE-2013-2448,
CVE-2013-2457, CVE-2013-2453)

Multiple flaws in the Serialization, Networking, Libraries and CORBA
components can be exploited by an untrusted Java application or applet to
gain access to potentially sensitive information. (CVE-2013-2456,
CVE-2013-2447, CVE-2013-2455, CVE-2013-2452, CVE-2013-2443, CVE-2013-2446)

It was discovered that the Hotspot component did not properly handle
out-of-memory errors. An untrusted Java application or applet could
possibly use these flaws to terminate the Java Virtual Machine.
(CVE-2013-2445)

It was discovered that the AWT component did not properly manage certain
resources and that the ObjectStreamClass of the Serialization component
did not properly handle circular references. An untrusted Java application
or applet could possibly use these flaws to cause a denial of service.
(CVE-2013-2444, CVE-2013-2450)

It was discovered that the Libraries component contained certain errors
related to XML security and the class loader. A remote attacker could
possibly exploit these flaws to bypass intended security mechanisms or
disclose potentially sensitive information and cause a denial of service.
(CVE-2013-2407, CVE-2013-2461)

It was discovered that JConsole did not properly inform the user when
establishing an SSL connection failed. An attacker could exploit this flaw
to gain access to potentially sensitive information. (CVE-2013-2412)

It was found that documentation generated by Javadoc was vulnerable to a
frame injection attack. If such documentation was accessible over a
network, and a remote attacker could trick a user into visiting a
specially-crafted URL, it would lead to arbitrary web content being
displayed next to the documentation. This could be used to perform a
phishing attack by providing frame content that spoofed a login form on
the site hosting the vulnerable documentation. (CVE-2013-1571)

It was discovered that the 2D component created shared memory segments with
insecure permissions. A local attacker could use this flaw to read or write
to the shared memory segment. (CVE-2013-1500)

Red Hat would like to thank US-CERT for reporting CVE-2013-1571, and Tim
Brown for reporting CVE-2013-1500. US-CERT acknowledges Oracle as the
original reporter of CVE-2013-1571.

All users of java-1.6.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.src.rpm
File outdated by:  RHSA-2014:0408
    MD5: 83525f571aab3076fb9916fd8fdd8704
SHA-256: 8b73b29ab0e13d923205894a00ad276b97422738609f0d8e3fd4fe5b2d20bf17
 
IA-32:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: d78dd7a5e69e050b3796be6a8abbab9c
SHA-256: 9cfa64b1e7069af1c33de0b1ce9d9ba43957e562bac5e9af7745b0de74d70fc8
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: 06bfdcef52a9b1d8e16b07c58af8af30
SHA-256: 6a2a50da04dedf1e5c5ac3d33e58173750d2c9beae9ba4d5edcd1db690ecb2d7
java-1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: ed4a879bc7d0cfa922426b699a61b808
SHA-256: 6dd5356c6826c76ab65dcd0dd35a9001efd96e84ac777a627ca68c071a7de006
java-1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: 5fc3baf2e505104d73e859bf8a5abc92
SHA-256: 0aff5235e264e1f4fbeed98bd8142b07818bd64f307bcab6d5186c9e9a699367
java-1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: e15645b14543ff63fe3d467292c7c251
SHA-256: eeab0de0f484411545c2c71d7dfd732031fd275d8bc0a205565c16a27020867c
java-1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: fc8ae9b8f3adbd87f0f81d4e813d9b36
SHA-256: 3511741d6528c6257ccb46e50f76a420e3b7074282e8154cac10dd52f466dae3
 
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: a542b57f744398d758409a126e3bd3ae
SHA-256: 155d24ce1f9ca7dd79e2b67034f67b43447ca97eb1c3b0dc2e9b9793d38c2908
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 8d37525ba9eab8266e4e0250046d3e27
SHA-256: adcb682363980212b7da6a29de69a309a182461bd2c26af29694d05b856dbf6a
java-1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 108029e856e7cebf2bb37db497332e70
SHA-256: 70d21fb79e0dfa5edd9702e419bf68fdb1575ff2d8eee26b7c47bf506fd88699
java-1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 65c193ce02eb967da1c93686b88ee0e9
SHA-256: 1bf74468d389c24944981b72296ae9e9272646fefd1e51045498670f36349a32
java-1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: d72ad50a5212ff16e5ccab7e477011ef
SHA-256: 6129fa1c46e193efdebf63785ee463299015c94c1f20ca8b72567e72e0c625eb
java-1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: bc75a41b37525f0387f0674638086b61
SHA-256: a66d07ab5c3c95df3cf3d26dafce03e9244fca3a60c2c72ad1f999a16d196c61
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.src.rpm
File outdated by:  RHSA-2014:0408
    MD5: 83525f571aab3076fb9916fd8fdd8704
SHA-256: 8b73b29ab0e13d923205894a00ad276b97422738609f0d8e3fd4fe5b2d20bf17
 
IA-32:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: d78dd7a5e69e050b3796be6a8abbab9c
SHA-256: 9cfa64b1e7069af1c33de0b1ce9d9ba43957e562bac5e9af7745b0de74d70fc8
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: 06bfdcef52a9b1d8e16b07c58af8af30
SHA-256: 6a2a50da04dedf1e5c5ac3d33e58173750d2c9beae9ba4d5edcd1db690ecb2d7
java-1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: ed4a879bc7d0cfa922426b699a61b808
SHA-256: 6dd5356c6826c76ab65dcd0dd35a9001efd96e84ac777a627ca68c071a7de006
java-1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: 5fc3baf2e505104d73e859bf8a5abc92
SHA-256: 0aff5235e264e1f4fbeed98bd8142b07818bd64f307bcab6d5186c9e9a699367
java-1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: e15645b14543ff63fe3d467292c7c251
SHA-256: eeab0de0f484411545c2c71d7dfd732031fd275d8bc0a205565c16a27020867c
java-1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm
File outdated by:  RHSA-2014:0408
    MD5: fc8ae9b8f3adbd87f0f81d4e813d9b36
SHA-256: 3511741d6528c6257ccb46e50f76a420e3b7074282e8154cac10dd52f466dae3
 
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: a542b57f744398d758409a126e3bd3ae
SHA-256: 155d24ce1f9ca7dd79e2b67034f67b43447ca97eb1c3b0dc2e9b9793d38c2908
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 8d37525ba9eab8266e4e0250046d3e27
SHA-256: adcb682363980212b7da6a29de69a309a182461bd2c26af29694d05b856dbf6a
java-1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 108029e856e7cebf2bb37db497332e70
SHA-256: 70d21fb79e0dfa5edd9702e419bf68fdb1575ff2d8eee26b7c47bf506fd88699
java-1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 65c193ce02eb967da1c93686b88ee0e9
SHA-256: 1bf74468d389c24944981b72296ae9e9272646fefd1e51045498670f36349a32
java-1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: d72ad50a5212ff16e5ccab7e477011ef
SHA-256: 6129fa1c46e193efdebf63785ee463299015c94c1f20ca8b72567e72e0c625eb
java-1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: bc75a41b37525f0387f0674638086b61
SHA-256: a66d07ab5c3c95df3cf3d26dafce03e9244fca3a60c2c72ad1f999a16d196c61
 
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.src.rpm
File outdated by:  RHSA-2014:0408
    MD5: 41e65687f5bbfc28e8184e5e51de1a92
SHA-256: 343278a16cb05ee9a3fc781f7ad4750a409529852904ad24909c67b456603771
 
IA-32:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: e06e0e2a9bfc7118b397dae2cf925ab4
SHA-256: 1b72b9ea3a78419d7fec08814815bca7e9fd8706a154b6e84ac94dc25cce771b
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: 1f78df20ff4b92f6f613b966c8067d04
SHA-256: 6937eea57d385b46a5d6c92dbb4287595fb3d3b9d2297731f5d0e2aea3855c35
java-1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: 8b716fd8130fa686942e4cd30148c73f
SHA-256: 54e64dc977ff7c8a85e58e38c7831066adfcb97822cce6b25b2bb7e5e38912a2
java-1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: c7e5ef9e56dccebf790898c7a2f011c6
SHA-256: 6cd233b8637363f4d19ba5a1ce137131e4630d1feb686d3c851b0babefb914fa
java-1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: ccf0e37467c721d66f0deab946913940
SHA-256: 635a9cebb34e157e09b21ebd068b76b640d1798d466506af9c6eaff075bcd357
java-1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: c8aa266948cab7e4eea7082631e0b3d1
SHA-256: 670bb147c78b4dbae44768e8cd442bb93b3e432b188049632df9612156a86d91
 
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: dbc844126c3bd31228253cdd48c141e1
SHA-256: bf85a565000bacc2c3305425a48006ddda4f3949f144562b80fb8de01f1bbfef
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 792146288679f9026f6e29fb119a71d6
SHA-256: 4edead31ff35408f65907734ad421f1ca31dc6efc09c38c86f726afbaf2df65b
java-1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: b97c0b1ca7fd9ed9d14abf1e28d3fce0
SHA-256: 7355d82cbae50b092ddfe7f28b25e97033751fe84e02e82ab0081ba7056fe8f4
java-1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: e61983461efd8e0617484ad4cc9cfc5e
SHA-256: 614dc531b5d942ec7f26b2a0c7338e72e22bf92393e7ca47fdc9cd7d8666b753
java-1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: b4e01e5cbed3978c15d1d8b0e8a0efa3
SHA-256: 7a5e6fb0daf2c1704a8e15c5f97738b729e76530f4cc77e57d0740fc3f7a7a1b
java-1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 81ddb09baa52243f8acf118c43126b89
SHA-256: fbba42ab52a45cb5e88ee4a4dce677762e98a85371e3bbce75174c2700c76812
 
Red Hat Enterprise Linux EUS (v. 5.9.z server)

SRPMS:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.src.rpm
File outdated by:  RHSA-2014:0408
    MD5: 83525f571aab3076fb9916fd8fdd8704
SHA-256: 8b73b29ab0e13d923205894a00ad276b97422738609f0d8e3fd4fe5b2d20bf17
 
IA-32:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: d78dd7a5e69e050b3796be6a8abbab9c
SHA-256: 9cfa64b1e7069af1c33de0b1ce9d9ba43957e562bac5e9af7745b0de74d70fc8
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: 06bfdcef52a9b1d8e16b07c58af8af30
SHA-256: 6a2a50da04dedf1e5c5ac3d33e58173750d2c9beae9ba4d5edcd1db690ecb2d7
java-1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: ed4a879bc7d0cfa922426b699a61b808
SHA-256: 6dd5356c6826c76ab65dcd0dd35a9001efd96e84ac777a627ca68c071a7de006
java-1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: 5fc3baf2e505104d73e859bf8a5abc92
SHA-256: 0aff5235e264e1f4fbeed98bd8142b07818bd64f307bcab6d5186c9e9a699367
java-1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: e15645b14543ff63fe3d467292c7c251
SHA-256: eeab0de0f484411545c2c71d7dfd732031fd275d8bc0a205565c16a27020867c
java-1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: fc8ae9b8f3adbd87f0f81d4e813d9b36
SHA-256: 3511741d6528c6257ccb46e50f76a420e3b7074282e8154cac10dd52f466dae3
 
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: a542b57f744398d758409a126e3bd3ae
SHA-256: 155d24ce1f9ca7dd79e2b67034f67b43447ca97eb1c3b0dc2e9b9793d38c2908
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: 8d37525ba9eab8266e4e0250046d3e27
SHA-256: adcb682363980212b7da6a29de69a309a182461bd2c26af29694d05b856dbf6a
java-1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: 108029e856e7cebf2bb37db497332e70
SHA-256: 70d21fb79e0dfa5edd9702e419bf68fdb1575ff2d8eee26b7c47bf506fd88699
java-1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: 65c193ce02eb967da1c93686b88ee0e9
SHA-256: 1bf74468d389c24944981b72296ae9e9272646fefd1e51045498670f36349a32
java-1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: d72ad50a5212ff16e5ccab7e477011ef
SHA-256: 6129fa1c46e193efdebf63785ee463299015c94c1f20ca8b72567e72e0c625eb
java-1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: bc75a41b37525f0387f0674638086b61
SHA-256: a66d07ab5c3c95df3cf3d26dafce03e9244fca3a60c2c72ad1f999a16d196c61
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.src.rpm
File outdated by:  RHSA-2014:0408
    MD5: 41e65687f5bbfc28e8184e5e51de1a92
SHA-256: 343278a16cb05ee9a3fc781f7ad4750a409529852904ad24909c67b456603771
 
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: dbc844126c3bd31228253cdd48c141e1
SHA-256: bf85a565000bacc2c3305425a48006ddda4f3949f144562b80fb8de01f1bbfef
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 792146288679f9026f6e29fb119a71d6
SHA-256: 4edead31ff35408f65907734ad421f1ca31dc6efc09c38c86f726afbaf2df65b
java-1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: b97c0b1ca7fd9ed9d14abf1e28d3fce0
SHA-256: 7355d82cbae50b092ddfe7f28b25e97033751fe84e02e82ab0081ba7056fe8f4
java-1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: e61983461efd8e0617484ad4cc9cfc5e
SHA-256: 614dc531b5d942ec7f26b2a0c7338e72e22bf92393e7ca47fdc9cd7d8666b753
java-1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: b4e01e5cbed3978c15d1d8b0e8a0efa3
SHA-256: 7a5e6fb0daf2c1704a8e15c5f97738b729e76530f4cc77e57d0740fc3f7a7a1b
java-1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 81ddb09baa52243f8acf118c43126b89
SHA-256: fbba42ab52a45cb5e88ee4a4dce677762e98a85371e3bbce75174c2700c76812
 
Red Hat Enterprise Linux Long Life (v. 5.9 server)

SRPMS:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.src.rpm
File outdated by:  RHSA-2014:0408
    MD5: 83525f571aab3076fb9916fd8fdd8704
SHA-256: 8b73b29ab0e13d923205894a00ad276b97422738609f0d8e3fd4fe5b2d20bf17
 
IA-32:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: d78dd7a5e69e050b3796be6a8abbab9c
SHA-256: 9cfa64b1e7069af1c33de0b1ce9d9ba43957e562bac5e9af7745b0de74d70fc8
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: 06bfdcef52a9b1d8e16b07c58af8af30
SHA-256: 6a2a50da04dedf1e5c5ac3d33e58173750d2c9beae9ba4d5edcd1db690ecb2d7
java-1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: ed4a879bc7d0cfa922426b699a61b808
SHA-256: 6dd5356c6826c76ab65dcd0dd35a9001efd96e84ac777a627ca68c071a7de006
java-1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: 5fc3baf2e505104d73e859bf8a5abc92
SHA-256: 0aff5235e264e1f4fbeed98bd8142b07818bd64f307bcab6d5186c9e9a699367
java-1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: e15645b14543ff63fe3d467292c7c251
SHA-256: eeab0de0f484411545c2c71d7dfd732031fd275d8bc0a205565c16a27020867c
java-1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9.i386.rpm     MD5: fc8ae9b8f3adbd87f0f81d4e813d9b36
SHA-256: 3511741d6528c6257ccb46e50f76a420e3b7074282e8154cac10dd52f466dae3
 
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: a542b57f744398d758409a126e3bd3ae
SHA-256: 155d24ce1f9ca7dd79e2b67034f67b43447ca97eb1c3b0dc2e9b9793d38c2908
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: 8d37525ba9eab8266e4e0250046d3e27
SHA-256: adcb682363980212b7da6a29de69a309a182461bd2c26af29694d05b856dbf6a
java-1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: 108029e856e7cebf2bb37db497332e70
SHA-256: 70d21fb79e0dfa5edd9702e419bf68fdb1575ff2d8eee26b7c47bf506fd88699
java-1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: 65c193ce02eb967da1c93686b88ee0e9
SHA-256: 1bf74468d389c24944981b72296ae9e9272646fefd1e51045498670f36349a32
java-1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: d72ad50a5212ff16e5ccab7e477011ef
SHA-256: 6129fa1c46e193efdebf63785ee463299015c94c1f20ca8b72567e72e0c625eb
java-1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.el5_9.x86_64.rpm     MD5: bc75a41b37525f0387f0674638086b61
SHA-256: a66d07ab5c3c95df3cf3d26dafce03e9244fca3a60c2c72ad1f999a16d196c61
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.src.rpm
File outdated by:  RHSA-2014:0408
    MD5: 41e65687f5bbfc28e8184e5e51de1a92
SHA-256: 343278a16cb05ee9a3fc781f7ad4750a409529852904ad24909c67b456603771
 
IA-32:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: e06e0e2a9bfc7118b397dae2cf925ab4
SHA-256: 1b72b9ea3a78419d7fec08814815bca7e9fd8706a154b6e84ac94dc25cce771b
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: 1f78df20ff4b92f6f613b966c8067d04
SHA-256: 6937eea57d385b46a5d6c92dbb4287595fb3d3b9d2297731f5d0e2aea3855c35
java-1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: 8b716fd8130fa686942e4cd30148c73f
SHA-256: 54e64dc977ff7c8a85e58e38c7831066adfcb97822cce6b25b2bb7e5e38912a2
java-1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: c7e5ef9e56dccebf790898c7a2f011c6
SHA-256: 6cd233b8637363f4d19ba5a1ce137131e4630d1feb686d3c851b0babefb914fa
java-1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: ccf0e37467c721d66f0deab946913940
SHA-256: 635a9cebb34e157e09b21ebd068b76b640d1798d466506af9c6eaff075bcd357
java-1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: c8aa266948cab7e4eea7082631e0b3d1
SHA-256: 670bb147c78b4dbae44768e8cd442bb93b3e432b188049632df9612156a86d91
 
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: dbc844126c3bd31228253cdd48c141e1
SHA-256: bf85a565000bacc2c3305425a48006ddda4f3949f144562b80fb8de01f1bbfef
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 792146288679f9026f6e29fb119a71d6
SHA-256: 4edead31ff35408f65907734ad421f1ca31dc6efc09c38c86f726afbaf2df65b
java-1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: b97c0b1ca7fd9ed9d14abf1e28d3fce0
SHA-256: 7355d82cbae50b092ddfe7f28b25e97033751fe84e02e82ab0081ba7056fe8f4
java-1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: e61983461efd8e0617484ad4cc9cfc5e
SHA-256: 614dc531b5d942ec7f26b2a0c7338e72e22bf92393e7ca47fdc9cd7d8666b753
java-1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: b4e01e5cbed3978c15d1d8b0e8a0efa3
SHA-256: 7a5e6fb0daf2c1704a8e15c5f97738b729e76530f4cc77e57d0740fc3f7a7a1b
java-1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 81ddb09baa52243f8acf118c43126b89
SHA-256: fbba42ab52a45cb5e88ee4a4dce677762e98a85371e3bbce75174c2700c76812
 
Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.src.rpm
File outdated by:  RHSA-2014:0408
    MD5: 41e65687f5bbfc28e8184e5e51de1a92
SHA-256: 343278a16cb05ee9a3fc781f7ad4750a409529852904ad24909c67b456603771
 
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: dbc844126c3bd31228253cdd48c141e1
SHA-256: bf85a565000bacc2c3305425a48006ddda4f3949f144562b80fb8de01f1bbfef
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: 792146288679f9026f6e29fb119a71d6
SHA-256: 4edead31ff35408f65907734ad421f1ca31dc6efc09c38c86f726afbaf2df65b
java-1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: b97c0b1ca7fd9ed9d14abf1e28d3fce0
SHA-256: 7355d82cbae50b092ddfe7f28b25e97033751fe84e02e82ab0081ba7056fe8f4
java-1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: e61983461efd8e0617484ad4cc9cfc5e
SHA-256: 614dc531b5d942ec7f26b2a0c7338e72e22bf92393e7ca47fdc9cd7d8666b753
java-1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: b4e01e5cbed3978c15d1d8b0e8a0efa3
SHA-256: 7a5e6fb0daf2c1704a8e15c5f97738b729e76530f4cc77e57d0740fc3f7a7a1b
java-1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: 81ddb09baa52243f8acf118c43126b89
SHA-256: fbba42ab52a45cb5e88ee4a4dce677762e98a85371e3bbce75174c2700c76812
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.src.rpm
File outdated by:  RHSA-2014:0408
    MD5: 41e65687f5bbfc28e8184e5e51de1a92
SHA-256: 343278a16cb05ee9a3fc781f7ad4750a409529852904ad24909c67b456603771
 
IA-32:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2013:1505
    MD5: e06e0e2a9bfc7118b397dae2cf925ab4
SHA-256: 1b72b9ea3a78419d7fec08814815bca7e9fd8706a154b6e84ac94dc25cce771b
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2013:1505
    MD5: 1f78df20ff4b92f6f613b966c8067d04
SHA-256: 6937eea57d385b46a5d6c92dbb4287595fb3d3b9d2297731f5d0e2aea3855c35
java-1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2013:1505
    MD5: 8b716fd8130fa686942e4cd30148c73f
SHA-256: 54e64dc977ff7c8a85e58e38c7831066adfcb97822cce6b25b2bb7e5e38912a2
java-1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2013:1505
    MD5: c7e5ef9e56dccebf790898c7a2f011c6
SHA-256: 6cd233b8637363f4d19ba5a1ce137131e4630d1feb686d3c851b0babefb914fa
java-1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2013:1505
    MD5: ccf0e37467c721d66f0deab946913940
SHA-256: 635a9cebb34e157e09b21ebd068b76b640d1798d466506af9c6eaff075bcd357
java-1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2013:1505
    MD5: c8aa266948cab7e4eea7082631e0b3d1
SHA-256: 670bb147c78b4dbae44768e8cd442bb93b3e432b188049632df9612156a86d91
 
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: dbc844126c3bd31228253cdd48c141e1
SHA-256: bf85a565000bacc2c3305425a48006ddda4f3949f144562b80fb8de01f1bbfef
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: 792146288679f9026f6e29fb119a71d6
SHA-256: 4edead31ff35408f65907734ad421f1ca31dc6efc09c38c86f726afbaf2df65b
java-1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: b97c0b1ca7fd9ed9d14abf1e28d3fce0
SHA-256: 7355d82cbae50b092ddfe7f28b25e97033751fe84e02e82ab0081ba7056fe8f4
java-1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: e61983461efd8e0617484ad4cc9cfc5e
SHA-256: 614dc531b5d942ec7f26b2a0c7338e72e22bf92393e7ca47fdc9cd7d8666b753
java-1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: b4e01e5cbed3978c15d1d8b0e8a0efa3
SHA-256: 7a5e6fb0daf2c1704a8e15c5f97738b729e76530f4cc77e57d0740fc3f7a7a1b
java-1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1505
    MD5: 81ddb09baa52243f8acf118c43126b89
SHA-256: fbba42ab52a45cb5e88ee4a4dce677762e98a85371e3bbce75174c2700c76812
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.src.rpm
File outdated by:  RHSA-2014:0408
    MD5: 41e65687f5bbfc28e8184e5e51de1a92
SHA-256: 343278a16cb05ee9a3fc781f7ad4750a409529852904ad24909c67b456603771
 
IA-32:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: e06e0e2a9bfc7118b397dae2cf925ab4
SHA-256: 1b72b9ea3a78419d7fec08814815bca7e9fd8706a154b6e84ac94dc25cce771b
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: 1f78df20ff4b92f6f613b966c8067d04
SHA-256: 6937eea57d385b46a5d6c92dbb4287595fb3d3b9d2297731f5d0e2aea3855c35
java-1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: 8b716fd8130fa686942e4cd30148c73f
SHA-256: 54e64dc977ff7c8a85e58e38c7831066adfcb97822cce6b25b2bb7e5e38912a2
java-1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: c7e5ef9e56dccebf790898c7a2f011c6
SHA-256: 6cd233b8637363f4d19ba5a1ce137131e4630d1feb686d3c851b0babefb914fa
java-1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: ccf0e37467c721d66f0deab946913940
SHA-256: 635a9cebb34e157e09b21ebd068b76b640d1798d466506af9c6eaff075bcd357
java-1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4.i686.rpm
File outdated by:  RHSA-2014:0408
    MD5: c8aa266948cab7e4eea7082631e0b3d1
SHA-256: 670bb147c78b4dbae44768e8cd442bb93b3e432b188049632df9612156a86d91
 
x86_64:
java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: dbc844126c3bd31228253cdd48c141e1
SHA-256: bf85a565000bacc2c3305425a48006ddda4f3949f144562b80fb8de01f1bbfef
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 792146288679f9026f6e29fb119a71d6
SHA-256: 4edead31ff35408f65907734ad421f1ca31dc6efc09c38c86f726afbaf2df65b
java-1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: b97c0b1ca7fd9ed9d14abf1e28d3fce0
SHA-256: 7355d82cbae50b092ddfe7f28b25e97033751fe84e02e82ab0081ba7056fe8f4
java-1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: e61983461efd8e0617484ad4cc9cfc5e
SHA-256: 614dc531b5d942ec7f26b2a0c7338e72e22bf92393e7ca47fdc9cd7d8666b753
java-1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: b4e01e5cbed3978c15d1d8b0e8a0efa3
SHA-256: 7a5e6fb0daf2c1704a8e15c5f97738b729e76530f4cc77e57d0740fc3f7a7a1b
java-1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0408
    MD5: 81ddb09baa52243f8acf118c43126b89
SHA-256: fbba42ab52a45cb5e88ee4a4dce677762e98a85371e3bbce75174c2700c76812
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

973474 - CVE-2013-1571 OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)
975099 - CVE-2013-2470 OpenJDK: ImagingLib byte lookup processing (2D, 8011243)
975102 - CVE-2013-2471 OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)
975107 - CVE-2013-2472 OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)
975110 - CVE-2013-2473 OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)
975115 - CVE-2013-2463 OpenJDK: Incorrect image attribute verification (2D, 8012438)
975118 - CVE-2013-2465 OpenJDK: Incorrect image channel verification (2D, 8012597)
975120 - CVE-2013-2469 OpenJDK: Incorrect image layout verification (2D, 8012601)
975121 - CVE-2013-2459 OpenJDK: Various AWT integer overflow checks (AWT, 8009071)
975124 - CVE-2013-2445 OpenJDK: Better handling of memory allocation errors (Hotspot, 7158805)
975125 - CVE-2013-2448 OpenJDK: Better access restrictions (Sound, 8006328)
975126 - CVE-2013-2461 OpenJDK: Missing check for valid DOMCanonicalizationMethod canonicalization algorithm (Libraries, 8014281)
975127 - CVE-2013-2407 OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)
975131 - CVE-2013-2444 OpenJDK: Resource denial of service (AWT, 8001038)
975132 - CVE-2013-2446 OpenJDK: output stream access restrictions (CORBA, 8000642)
975133 - CVE-2013-2457 OpenJDK: Proper class checking (JMX, 8008120)
975134 - CVE-2013-2453 OpenJDK: MBeanServer Introspector package access (JMX, 8008124)
975137 - CVE-2013-2443 OpenJDK: AccessControlContext check order issue (Libraries, 8001330)
975138 - CVE-2013-2452 OpenJDK: Unique VMIDs (Libraries, 8001033)
975139 - CVE-2013-2455 OpenJDK: getEnclosing* checks (Libraries, 8007812)
975140 - CVE-2013-2447 OpenJDK: Prevent revealing the local address (Networking, 8001318)
975141 - CVE-2013-2450 OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)
975142 - CVE-2013-2456 OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)
975144 - CVE-2013-2412 OpenJDK: JConsole SSL support (Serviceability, 8003703)
975148 - CVE-2013-1500 OpenJDK: Insecure shared memory permissions (2D, 8001034)


References

https://www.redhat.com/security/data/cve/CVE-2013-1500.html
https://www.redhat.com/security/data/cve/CVE-2013-1571.html
https://www.redhat.com/security/data/cve/CVE-2013-2407.html
https://www.redhat.com/security/data/cve/CVE-2013-2412.html
https://www.redhat.com/security/data/cve/CVE-2013-2443.html
https://www.redhat.com/security/data/cve/CVE-2013-2444.html
https://www.redhat.com/security/data/cve/CVE-2013-2445.html
https://www.redhat.com/security/data/cve/CVE-2013-2446.html
https://www.redhat.com/security/data/cve/CVE-2013-2447.html
https://www.redhat.com/security/data/cve/CVE-2013-2448.html
https://www.redhat.com/security/data/cve/CVE-2013-2450.html
https://www.redhat.com/security/data/cve/CVE-2013-2452.html
https://www.redhat.com/security/data/cve/CVE-2013-2453.html
https://www.redhat.com/security/data/cve/CVE-2013-2455.html
https://www.redhat.com/security/data/cve/CVE-2013-2456.html
https://www.redhat.com/security/data/cve/CVE-2013-2457.html
https://www.redhat.com/security/data/cve/CVE-2013-2459.html
https://www.redhat.com/security/data/cve/CVE-2013-2461.html
https://www.redhat.com/security/data/cve/CVE-2013-2463.html
https://www.redhat.com/security/data/cve/CVE-2013-2465.html
https://www.redhat.com/security/data/cve/CVE-2013-2469.html
https://www.redhat.com/security/data/cve/CVE-2013-2470.html
https://www.redhat.com/security/data/cve/CVE-2013-2471.html
https://www.redhat.com/security/data/cve/CVE-2013-2472.html
https://www.redhat.com/security/data/cve/CVE-2013-2473.html
https://access.redhat.com/security/updates/classification/#important


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/