Red Hat Customer Portal

Skip to main content

Security Advisory Important: java-1.6.0-openjdk security update

Advisory: RHSA-2015:0085-2
Type: Security Advisory
Severity: Important
Issued on: 2015-01-26
Last updated on: 2015-01-26
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Desktop (v. 7)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux HPC Node (v. 7)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server (v. 7)
Red Hat Enterprise Linux Server EUS (v. 6.6.z)
Red Hat Enterprise Linux Workstation (v. 6)
Red Hat Enterprise Linux Workstation (v. 7)
CVEs (cve.mitre.org): CVE-2014-3566
CVE-2014-6585
CVE-2014-6587
CVE-2014-6591
CVE-2014-6593
CVE-2014-6601
CVE-2015-0383
CVE-2015-0395
CVE-2015-0407
CVE-2015-0408
CVE-2015-0410
CVE-2015-0412

Details

Updated java-1.6.0-openjdk packages that fix multiple security issues are
now available for Red Hat Enterprise Linux 5, 6, and 7.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

The java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime
Environment and the OpenJDK 6 Java Software Development Kit.

A flaw was found in the way the Hotspot component in OpenJDK verified
bytecode from the class files. An untrusted Java application or applet
could possibly use this flaw to bypass Java sandbox restrictions.
(CVE-2014-6601)

Multiple improper permission check issues were discovered in the JAX-WS,
and RMI components in OpenJDK. An untrusted Java application or applet
could use these flaws to bypass Java sandbox restrictions. (CVE-2015-0412,
CVE-2015-0408)

A flaw was found in the way the Hotspot garbage collector handled phantom
references. An untrusted Java application or applet could use this flaw to
corrupt the Java Virtual Machine memory and, possibly, execute arbitrary
code, bypassing Java sandbox restrictions. (CVE-2015-0395)

A flaw was found in the way the DER (Distinguished Encoding Rules) decoder
in the Security component in OpenJDK handled negative length values. A
specially crafted, DER-encoded input could cause a Java application to
enter an infinite loop when decoded. (CVE-2015-0410)

A flaw was found in the way the SSL 3.0 protocol handled padding bytes when
decrypting messages that were encrypted using block ciphers in cipher block
chaining (CBC) mode. This flaw could possibly allow a man-in-the-middle
(MITM) attacker to decrypt portions of the cipher text using a padding
oracle attack. (CVE-2014-3566)

Note: This update disables SSL 3.0 by default to address this issue.
The jdk.tls.disabledAlgorithms security property can be used to re-enable
SSL 3.0 support if needed. For additional information, refer to the Red Hat
Bugzilla bug linked to in the References section.

It was discovered that the SSL/TLS implementation in the JSSE component in
OpenJDK failed to properly check whether the ChangeCipherSpec was received
during the SSL/TLS connection handshake. An MITM attacker could possibly
use this flaw to force a connection to be established without encryption
being enabled. (CVE-2014-6593)

An information leak flaw was found in the Swing component in OpenJDK. An
untrusted Java application or applet could use this flaw to bypass certain
Java sandbox restrictions. (CVE-2015-0407)

A NULL pointer dereference flaw was found in the MulticastSocket
implementation in the Libraries component of OpenJDK. An untrusted Java
application or applet could possibly use this flaw to bypass certain Java
sandbox restrictions. (CVE-2014-6587)

Multiple boundary check flaws were found in the font parsing code in the 2D
component in OpenJDK. A specially crafted font file could allow an
untrusted Java application or applet to disclose portions of the Java
Virtual Machine memory. (CVE-2014-6585, CVE-2014-6591)

Multiple insecure temporary file use issues were found in the way the
Hotspot component in OpenJDK created performance statistics and error log
files. A local attacker could possibly make a victim using OpenJDK
overwrite arbitrary files using a symlink attack. (CVE-2015-0383)

The CVE-2015-0383 issue was discovered by Red Hat.

All users of java-1.6.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.src.rpm
File outdated by:  RHSA-2016:0723
    MD5: e67ddcfe8226e8f05dbf341e237b1af4
SHA-256: 0b309250ab5ae6e17ce40f89ff8b58bfa373ee2351d2603e897b6fb3b3c0bc83
 
IA-32:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: bf82bb536f11a530b22b8dc3a96ee769
SHA-256: dec609abd276786fbc89b4164ba7f1543019ea1cf0cc120061794eb3838bab1a
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: 8d01ed90da4bdb66e1d5b7e686c1358d
SHA-256: 658d85ebf41cb810065602f25be6beb7d2d5af57b9fa2c59222f98376a1ec403
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: dc9d5a61ff27a65f6563e7efea1438dc
SHA-256: c584f6e2abd254b6586fa9e3173744fbfb8ebebf6a1b8ea1aa34e375b1004de2
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: c9ed65e339f04154005c70429e28df3e
SHA-256: f42142a318000da1132bb4d57686a97b6e4748957efe4f553a03d2721082fa94
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: 60baa9bda112148ec4341a60bcbf84eb
SHA-256: 09d9b35d4449983a9ef23924d48ea6e9dfc86a40f8328a93634ebbaec46ebcf3
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: 3d6c04daace674aae8c60323f927d19c
SHA-256: 4ace436c41f2b2ee59a7654f0b635552d411d0db80841b6fd349bf8ec6431702
 
x86_64:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: f77f691c35225ca168b21c6f16e25142
SHA-256: 196977baeb6b520352eddd7d7e9bdb4e967379522c4af046967771b504cb0360
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: b23df5ed007dff60862d2e270944a7ea
SHA-256: ad61f00cffeea8567fac930ef1deb1641f7e0cb71b7f60773adeb55a898a7621
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: c7ba3c6f218d337588e3363296d61a22
SHA-256: 57685445da48fcad678d66e540409f6d457d57a741ef21a18430391f38dc83cc
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 7d02e1fd242073f4982e0fbba5dfc63b
SHA-256: 6b950fc6d9d637373bca38a36fc884f4e5c17d994348f380c4f5d7dbf222050b
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: bcb8b8e4a05cda7b58fe4baf8c602115
SHA-256: 393d91b3c4cbe0cca929db172bbe7c9960a413085c726623ba104e608f6ba7a4
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 17a41b608ada07f03ad6d0f1c1782e11
SHA-256: 6ce8431e87c285b6c85614dd9c5d398f9344379a49f9c5670ecfe8ddc3f41988
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.src.rpm
File outdated by:  RHSA-2016:0723
    MD5: e67ddcfe8226e8f05dbf341e237b1af4
SHA-256: 0b309250ab5ae6e17ce40f89ff8b58bfa373ee2351d2603e897b6fb3b3c0bc83
 
IA-32:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: bf82bb536f11a530b22b8dc3a96ee769
SHA-256: dec609abd276786fbc89b4164ba7f1543019ea1cf0cc120061794eb3838bab1a
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: 8d01ed90da4bdb66e1d5b7e686c1358d
SHA-256: 658d85ebf41cb810065602f25be6beb7d2d5af57b9fa2c59222f98376a1ec403
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: dc9d5a61ff27a65f6563e7efea1438dc
SHA-256: c584f6e2abd254b6586fa9e3173744fbfb8ebebf6a1b8ea1aa34e375b1004de2
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: c9ed65e339f04154005c70429e28df3e
SHA-256: f42142a318000da1132bb4d57686a97b6e4748957efe4f553a03d2721082fa94
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: 60baa9bda112148ec4341a60bcbf84eb
SHA-256: 09d9b35d4449983a9ef23924d48ea6e9dfc86a40f8328a93634ebbaec46ebcf3
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el5_11.i386.rpm
File outdated by:  RHSA-2016:0723
    MD5: 3d6c04daace674aae8c60323f927d19c
SHA-256: 4ace436c41f2b2ee59a7654f0b635552d411d0db80841b6fd349bf8ec6431702
 
x86_64:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: f77f691c35225ca168b21c6f16e25142
SHA-256: 196977baeb6b520352eddd7d7e9bdb4e967379522c4af046967771b504cb0360
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: b23df5ed007dff60862d2e270944a7ea
SHA-256: ad61f00cffeea8567fac930ef1deb1641f7e0cb71b7f60773adeb55a898a7621
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: c7ba3c6f218d337588e3363296d61a22
SHA-256: 57685445da48fcad678d66e540409f6d457d57a741ef21a18430391f38dc83cc
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 7d02e1fd242073f4982e0fbba5dfc63b
SHA-256: 6b950fc6d9d637373bca38a36fc884f4e5c17d994348f380c4f5d7dbf222050b
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: bcb8b8e4a05cda7b58fe4baf8c602115
SHA-256: 393d91b3c4cbe0cca929db172bbe7c9960a413085c726623ba104e608f6ba7a4
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 17a41b608ada07f03ad6d0f1c1782e11
SHA-256: 6ce8431e87c285b6c85614dd9c5d398f9344379a49f9c5670ecfe8ddc3f41988
 
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.src.rpm
File outdated by:  RHBA-2016:1006
    MD5: 76fa84e2f1db8ba766c1db4dade67c34
SHA-256: da845d77d6e5f00ad00aeeed2e78bec2c995ff89436e4bbcf57edf53be631308
 
IA-32:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: e21dfe5372040e5b6b168ec467005e53
SHA-256: 0e8de573a03a06ea479bdee65402259ed09851935e0445824bf4ac7599fb790b
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 2bdfe151df92de9d3cd8a7f7dfece650
SHA-256: d610e73955d5f07979d5925b186b03afcc27c058eeffc3c085878b4fc7e07444
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 47cc60630ea82b57d68bb015b2b3f7e0
SHA-256: 62fd3920292ee29b1e3715fc769fe3e2ec83c100cffc13fea143f2971df9e60c
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 7f3d667b4b798e2159cf7ce31edec721
SHA-256: ac559cdd94a02dc15ee274b4008d8c228cc9423bf276ee4ca428133ee40fd80a
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: e9b7b0182c3ea3b796210de8dbd387b0
SHA-256: 69cb8f7ba8a4b5d03d8e30e80ac99c3c7e64ceb61174f39b321abe8c32299a69
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 9a34c64009a782a31af9a5b9e3139965
SHA-256: 38169431fa3dfc29429f542ee7947c8574ae97a6c99800a8db8c0787d95783e0
 
x86_64:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 8f94a6cce54197e9626510a17df0214f
SHA-256: 22bd10250f092b3c810facf1137a08209574c1ce88143aac63b415940512c29d
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 1effa0f65547f81de1cb41e33845424e
SHA-256: ce211608b59ab4934637deacd1eabe390a5e76584b0afe4fdbb8da6d9fdb4974
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 4c38fecb6c5db5c4e04e191c2f0a4e82
SHA-256: cdbbcbbe9f422d8372d12d95c025d0358c5c15ddcb2ccf0d1b736d13b7c38df0
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: efec0fff765519e0d3d430a3604c0e9f
SHA-256: 2ea39acafe4965e3d048e41c58a6f1a0bedd3feb53e0014a8910651f79f57897
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 99abc78a5e199e435a4c5f8fdf064d59
SHA-256: 66c3daff1d2aab3dcc30b3ac27b43b23d416d89f5c6dfff609fee8b77e32b7fa
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 6211ea57a0dff2ff79306ceb0a69e0e2
SHA-256: c425183c67a1a2bed85f0b0b61d5bfb92994ebb1ec11c0d4f1d76c33df01ee19
 
Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0.src.rpm
File outdated by:  RHSA-2016:0723
    MD5: ed83c7a63b24c922b09a47f391b75e4f
SHA-256: 73351ac85024e4000c255119b28fa8dc174314953c7009fe9f1742b52c56b3a2
 
x86_64:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 925fc6c29afe463006669279cc8580b0
SHA-256: ab27b21fc0a9aec73cd870620ffaadaa6664840872cc499b5d58eccce55c3efc
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 2b20cb490c3d5b40e7c943ce5b972cfa
SHA-256: 4ee36356ad8922150fa161b11a720d21200f0c96fe87dfa54a3f457d8c955e05
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 33628a2d8754a13194f6b7b8af7a233f
SHA-256: abe1dfb09ebe3f75a527ee7b25ce991d908b7a09cda91b9267512f4adfe90f03
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 686cc0134b0fc6d9fabcd01e2c454c17
SHA-256: 7cf2c8dbc30576992c7d52e8ea7402ffc818fb20a9af8d37f3e9801831da43ff
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: fc3684eedf6213ed63e9ffe4f0aac85b
SHA-256: 40d75c70539014bc34b0a8fd953afbceb1969b8005330bde7cc3894031e3aabe
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 295dfe3de3fd29dd4236c02bd7191798
SHA-256: ce49fc4d2cfd4492db6db9362e8a8a06b1429034e3fae8956f9971883fad4c5b
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.src.rpm
File outdated by:  RHBA-2016:1006
    MD5: 76fa84e2f1db8ba766c1db4dade67c34
SHA-256: da845d77d6e5f00ad00aeeed2e78bec2c995ff89436e4bbcf57edf53be631308
 
x86_64:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 8f94a6cce54197e9626510a17df0214f
SHA-256: 22bd10250f092b3c810facf1137a08209574c1ce88143aac63b415940512c29d
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 1effa0f65547f81de1cb41e33845424e
SHA-256: ce211608b59ab4934637deacd1eabe390a5e76584b0afe4fdbb8da6d9fdb4974
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 4c38fecb6c5db5c4e04e191c2f0a4e82
SHA-256: cdbbcbbe9f422d8372d12d95c025d0358c5c15ddcb2ccf0d1b736d13b7c38df0
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: efec0fff765519e0d3d430a3604c0e9f
SHA-256: 2ea39acafe4965e3d048e41c58a6f1a0bedd3feb53e0014a8910651f79f57897
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 99abc78a5e199e435a4c5f8fdf064d59
SHA-256: 66c3daff1d2aab3dcc30b3ac27b43b23d416d89f5c6dfff609fee8b77e32b7fa
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 6211ea57a0dff2ff79306ceb0a69e0e2
SHA-256: c425183c67a1a2bed85f0b0b61d5bfb92994ebb1ec11c0d4f1d76c33df01ee19
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0.src.rpm
File outdated by:  RHSA-2016:0723
    MD5: ed83c7a63b24c922b09a47f391b75e4f
SHA-256: 73351ac85024e4000c255119b28fa8dc174314953c7009fe9f1742b52c56b3a2
 
x86_64:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 925fc6c29afe463006669279cc8580b0
SHA-256: ab27b21fc0a9aec73cd870620ffaadaa6664840872cc499b5d58eccce55c3efc
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 2b20cb490c3d5b40e7c943ce5b972cfa
SHA-256: 4ee36356ad8922150fa161b11a720d21200f0c96fe87dfa54a3f457d8c955e05
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 33628a2d8754a13194f6b7b8af7a233f
SHA-256: abe1dfb09ebe3f75a527ee7b25ce991d908b7a09cda91b9267512f4adfe90f03
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 686cc0134b0fc6d9fabcd01e2c454c17
SHA-256: 7cf2c8dbc30576992c7d52e8ea7402ffc818fb20a9af8d37f3e9801831da43ff
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: fc3684eedf6213ed63e9ffe4f0aac85b
SHA-256: 40d75c70539014bc34b0a8fd953afbceb1969b8005330bde7cc3894031e3aabe
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 295dfe3de3fd29dd4236c02bd7191798
SHA-256: ce49fc4d2cfd4492db6db9362e8a8a06b1429034e3fae8956f9971883fad4c5b
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.src.rpm
File outdated by:  RHBA-2016:1006
    MD5: 76fa84e2f1db8ba766c1db4dade67c34
SHA-256: da845d77d6e5f00ad00aeeed2e78bec2c995ff89436e4bbcf57edf53be631308
 
IA-32:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: e21dfe5372040e5b6b168ec467005e53
SHA-256: 0e8de573a03a06ea479bdee65402259ed09851935e0445824bf4ac7599fb790b
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 2bdfe151df92de9d3cd8a7f7dfece650
SHA-256: d610e73955d5f07979d5925b186b03afcc27c058eeffc3c085878b4fc7e07444
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 47cc60630ea82b57d68bb015b2b3f7e0
SHA-256: 62fd3920292ee29b1e3715fc769fe3e2ec83c100cffc13fea143f2971df9e60c
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 7f3d667b4b798e2159cf7ce31edec721
SHA-256: ac559cdd94a02dc15ee274b4008d8c228cc9423bf276ee4ca428133ee40fd80a
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: e9b7b0182c3ea3b796210de8dbd387b0
SHA-256: 69cb8f7ba8a4b5d03d8e30e80ac99c3c7e64ceb61174f39b321abe8c32299a69
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 9a34c64009a782a31af9a5b9e3139965
SHA-256: 38169431fa3dfc29429f542ee7947c8574ae97a6c99800a8db8c0787d95783e0
 
x86_64:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 8f94a6cce54197e9626510a17df0214f
SHA-256: 22bd10250f092b3c810facf1137a08209574c1ce88143aac63b415940512c29d
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 1effa0f65547f81de1cb41e33845424e
SHA-256: ce211608b59ab4934637deacd1eabe390a5e76584b0afe4fdbb8da6d9fdb4974
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 4c38fecb6c5db5c4e04e191c2f0a4e82
SHA-256: cdbbcbbe9f422d8372d12d95c025d0358c5c15ddcb2ccf0d1b736d13b7c38df0
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: efec0fff765519e0d3d430a3604c0e9f
SHA-256: 2ea39acafe4965e3d048e41c58a6f1a0bedd3feb53e0014a8910651f79f57897
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 99abc78a5e199e435a4c5f8fdf064d59
SHA-256: 66c3daff1d2aab3dcc30b3ac27b43b23d416d89f5c6dfff609fee8b77e32b7fa
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 6211ea57a0dff2ff79306ceb0a69e0e2
SHA-256: c425183c67a1a2bed85f0b0b61d5bfb92994ebb1ec11c0d4f1d76c33df01ee19
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0.src.rpm
File outdated by:  RHSA-2016:0723
    MD5: ed83c7a63b24c922b09a47f391b75e4f
SHA-256: 73351ac85024e4000c255119b28fa8dc174314953c7009fe9f1742b52c56b3a2
 
PPC:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0.ppc64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 65ee4aea8aadb9da584c1de53accd09e
SHA-256: 293a13785464b79b51b0395ea83c8d5da41a64ee0d700fa84a226d4898d44789
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el7_0.ppc64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 67f899cd061688ad14a75dc430b65009
SHA-256: 717507e6e63ffed260b8ecb29f6d172afc2ca486689b6191c852fd640181dc1c
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0.ppc64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 30fccb5f8b23b1c8ba9e06cbeca4d957
SHA-256: 426c37406c5d7281c8cce4c4cb1bf0bee52f7b340ac0fc628db3168414730bf1
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0.ppc64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 8f9cf20c92146393f88ca970810a4027
SHA-256: 76d223017bc33d74fb20a1128bc99b8c85bf694213d59c6162aa00ff2e582056
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0.ppc64.rpm
File outdated by:  RHSA-2016:0723
    MD5: ee32c438478a2a2beaa7b5ad4fa71a0a
SHA-256: e08a6df003407fec4975f6e23aca9e0ab3a2014f75813e1d025e450a8cac5673
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0.ppc64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 7bea068c2c8548e3dc4ecc2c7fa0ab55
SHA-256: 03ab0ea98b604853865d63fee4c0861fa78ccdb278b484b633482754b8c95082
 
s390x:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0.s390x.rpm
File outdated by:  RHSA-2016:0723
    MD5: da3e63f9bf86c3e600d07650198cfb50
SHA-256: 2fff5c378a33d78ff3aa9d43ea4da9623912da7b2e39b13f2ee09c6900b99601
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el7_0.s390x.rpm
File outdated by:  RHSA-2016:0723
    MD5: 09162037fd4e00a8433fa3713b29aeec
SHA-256: 71b59007cab763938a99bd6756e8a4ad8525893389ba5db1f3fe00cd9fc03194
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0.s390x.rpm
File outdated by:  RHSA-2016:0723
    MD5: 19410e2f552cccf841f012d5e6f157a0
SHA-256: 7698e6a16ada2cc47e09274968ed26ccbaeac55dbb13c8eb2076e784f1c05ee9
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0.s390x.rpm
File outdated by:  RHSA-2016:0723
    MD5: 25e5379585f63f5b7433f0984e2fd5ab
SHA-256: d120f52b02b3fd889feac4504d50ca3019af6d2a2ec4f8eb5a91cd2c1665097e
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0.s390x.rpm
File outdated by:  RHSA-2016:0723
    MD5: db84a7e7063d142b451b0af34f532e94
SHA-256: 9c098461ac3794ecb055b9b7467b8a8c54f4950010a281edb223c5e2b340f819
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0.s390x.rpm
File outdated by:  RHSA-2016:0723
    MD5: 9e7319f8f5f53ebed9f1ba654eecca87
SHA-256: 5e77b27ca763399a52e2f3394e23a87346e6c470b187cca2581b3451e52fa104
 
x86_64:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 925fc6c29afe463006669279cc8580b0
SHA-256: ab27b21fc0a9aec73cd870620ffaadaa6664840872cc499b5d58eccce55c3efc
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 2b20cb490c3d5b40e7c943ce5b972cfa
SHA-256: 4ee36356ad8922150fa161b11a720d21200f0c96fe87dfa54a3f457d8c955e05
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 33628a2d8754a13194f6b7b8af7a233f
SHA-256: abe1dfb09ebe3f75a527ee7b25ce991d908b7a09cda91b9267512f4adfe90f03
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 686cc0134b0fc6d9fabcd01e2c454c17
SHA-256: 7cf2c8dbc30576992c7d52e8ea7402ffc818fb20a9af8d37f3e9801831da43ff
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: fc3684eedf6213ed63e9ffe4f0aac85b
SHA-256: 40d75c70539014bc34b0a8fd953afbceb1969b8005330bde7cc3894031e3aabe
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 295dfe3de3fd29dd4236c02bd7191798
SHA-256: ce49fc4d2cfd4492db6db9362e8a8a06b1429034e3fae8956f9971883fad4c5b
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.src.rpm
File outdated by:  RHBA-2016:1006
    MD5: 76fa84e2f1db8ba766c1db4dade67c34
SHA-256: da845d77d6e5f00ad00aeeed2e78bec2c995ff89436e4bbcf57edf53be631308
 
IA-32:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHSA-2015:0808
    MD5: e21dfe5372040e5b6b168ec467005e53
SHA-256: 0e8de573a03a06ea479bdee65402259ed09851935e0445824bf4ac7599fb790b
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHSA-2015:0808
    MD5: 2bdfe151df92de9d3cd8a7f7dfece650
SHA-256: d610e73955d5f07979d5925b186b03afcc27c058eeffc3c085878b4fc7e07444
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHSA-2015:0808
    MD5: 47cc60630ea82b57d68bb015b2b3f7e0
SHA-256: 62fd3920292ee29b1e3715fc769fe3e2ec83c100cffc13fea143f2971df9e60c
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHSA-2015:0808
    MD5: 7f3d667b4b798e2159cf7ce31edec721
SHA-256: ac559cdd94a02dc15ee274b4008d8c228cc9423bf276ee4ca428133ee40fd80a
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHSA-2015:0808
    MD5: e9b7b0182c3ea3b796210de8dbd387b0
SHA-256: 69cb8f7ba8a4b5d03d8e30e80ac99c3c7e64ceb61174f39b321abe8c32299a69
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHSA-2015:0808
    MD5: 9a34c64009a782a31af9a5b9e3139965
SHA-256: 38169431fa3dfc29429f542ee7947c8574ae97a6c99800a8db8c0787d95783e0
 
x86_64:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHSA-2015:0808
    MD5: 8f94a6cce54197e9626510a17df0214f
SHA-256: 22bd10250f092b3c810facf1137a08209574c1ce88143aac63b415940512c29d
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHSA-2015:0808
    MD5: 1effa0f65547f81de1cb41e33845424e
SHA-256: ce211608b59ab4934637deacd1eabe390a5e76584b0afe4fdbb8da6d9fdb4974
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHSA-2015:0808
    MD5: 4c38fecb6c5db5c4e04e191c2f0a4e82
SHA-256: cdbbcbbe9f422d8372d12d95c025d0358c5c15ddcb2ccf0d1b736d13b7c38df0
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHSA-2015:0808
    MD5: efec0fff765519e0d3d430a3604c0e9f
SHA-256: 2ea39acafe4965e3d048e41c58a6f1a0bedd3feb53e0014a8910651f79f57897
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHSA-2015:0808
    MD5: 99abc78a5e199e435a4c5f8fdf064d59
SHA-256: 66c3daff1d2aab3dcc30b3ac27b43b23d416d89f5c6dfff609fee8b77e32b7fa
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHSA-2015:0808
    MD5: 6211ea57a0dff2ff79306ceb0a69e0e2
SHA-256: c425183c67a1a2bed85f0b0b61d5bfb92994ebb1ec11c0d4f1d76c33df01ee19
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.src.rpm
File outdated by:  RHBA-2016:1006
    MD5: 76fa84e2f1db8ba766c1db4dade67c34
SHA-256: da845d77d6e5f00ad00aeeed2e78bec2c995ff89436e4bbcf57edf53be631308
 
IA-32:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: e21dfe5372040e5b6b168ec467005e53
SHA-256: 0e8de573a03a06ea479bdee65402259ed09851935e0445824bf4ac7599fb790b
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 2bdfe151df92de9d3cd8a7f7dfece650
SHA-256: d610e73955d5f07979d5925b186b03afcc27c058eeffc3c085878b4fc7e07444
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 47cc60630ea82b57d68bb015b2b3f7e0
SHA-256: 62fd3920292ee29b1e3715fc769fe3e2ec83c100cffc13fea143f2971df9e60c
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 7f3d667b4b798e2159cf7ce31edec721
SHA-256: ac559cdd94a02dc15ee274b4008d8c228cc9423bf276ee4ca428133ee40fd80a
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: e9b7b0182c3ea3b796210de8dbd387b0
SHA-256: 69cb8f7ba8a4b5d03d8e30e80ac99c3c7e64ceb61174f39b321abe8c32299a69
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el6_6.i686.rpm
File outdated by:  RHBA-2016:1006
    MD5: 9a34c64009a782a31af9a5b9e3139965
SHA-256: 38169431fa3dfc29429f542ee7947c8574ae97a6c99800a8db8c0787d95783e0
 
x86_64:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 8f94a6cce54197e9626510a17df0214f
SHA-256: 22bd10250f092b3c810facf1137a08209574c1ce88143aac63b415940512c29d
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 1effa0f65547f81de1cb41e33845424e
SHA-256: ce211608b59ab4934637deacd1eabe390a5e76584b0afe4fdbb8da6d9fdb4974
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 4c38fecb6c5db5c4e04e191c2f0a4e82
SHA-256: cdbbcbbe9f422d8372d12d95c025d0358c5c15ddcb2ccf0d1b736d13b7c38df0
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: efec0fff765519e0d3d430a3604c0e9f
SHA-256: 2ea39acafe4965e3d048e41c58a6f1a0bedd3feb53e0014a8910651f79f57897
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 99abc78a5e199e435a4c5f8fdf064d59
SHA-256: 66c3daff1d2aab3dcc30b3ac27b43b23d416d89f5c6dfff609fee8b77e32b7fa
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el6_6.x86_64.rpm
File outdated by:  RHBA-2016:1006
    MD5: 6211ea57a0dff2ff79306ceb0a69e0e2
SHA-256: c425183c67a1a2bed85f0b0b61d5bfb92994ebb1ec11c0d4f1d76c33df01ee19
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0.src.rpm
File outdated by:  RHSA-2016:0723
    MD5: ed83c7a63b24c922b09a47f391b75e4f
SHA-256: 73351ac85024e4000c255119b28fa8dc174314953c7009fe9f1742b52c56b3a2
 
x86_64:
java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 925fc6c29afe463006669279cc8580b0
SHA-256: ab27b21fc0a9aec73cd870620ffaadaa6664840872cc499b5d58eccce55c3efc
java-1.6.0-openjdk-debuginfo-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 2b20cb490c3d5b40e7c943ce5b972cfa
SHA-256: 4ee36356ad8922150fa161b11a720d21200f0c96fe87dfa54a3f457d8c955e05
java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 33628a2d8754a13194f6b7b8af7a233f
SHA-256: abe1dfb09ebe3f75a527ee7b25ce991d908b7a09cda91b9267512f4adfe90f03
java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 686cc0134b0fc6d9fabcd01e2c454c17
SHA-256: 7cf2c8dbc30576992c7d52e8ea7402ffc818fb20a9af8d37f3e9801831da43ff
java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: fc3684eedf6213ed63e9ffe4f0aac85b
SHA-256: 40d75c70539014bc34b0a8fd953afbceb1969b8005330bde7cc3894031e3aabe
java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0.x86_64.rpm
File outdated by:  RHSA-2016:0723
    MD5: 295dfe3de3fd29dd4236c02bd7191798
SHA-256: ce49fc4d2cfd4492db6db9362e8a8a06b1429034e3fae8956f9971883fad4c5b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1123870 - CVE-2015-0383 OpenJDK: insecure hsperfdata temporary file handling (Hotspot, 8050807)
1152789 - CVE-2014-3566 SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
1183020 - CVE-2014-6601 OpenJDK: class verifier insufficient invokespecial calls verification (Hotspot, 8058982)
1183021 - CVE-2015-0412 OpenJDK: insufficient code privileges checks (JAX-WS, 8054367)
1183023 - CVE-2015-0408 OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309)
1183031 - CVE-2015-0395 OpenJDK: phantom references handling issue in garbage collector (Hotspot, 8047125)
1183043 - CVE-2015-0407 OpenJDK: directory information leak via file chooser (Swing, 8055304)
1183044 - CVE-2015-0410 OpenJDK: DER decoder infinite loop (Security, 8059485)
1183049 - CVE-2014-6593 OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555)
1183645 - CVE-2014-6585 ICU: font parsing OOB read (OpenJDK 2D, 8055489)
1183646 - CVE-2014-6591 ICU: font parsing OOB read (OpenJDK 2D, 8056276)
1183715 - CVE-2014-6587 OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/