Skip to navigation

Security Advisory Critical: java-1.5.0-ibm security update

Advisory: RHSA-2010:0873-2
Type: Security Advisory
Severity: Critical
Issued on: 2010-11-10
Last updated on: 2010-11-10
Affected Products: Red Hat Enterprise Linux Desktop Supplementary (v. 6)
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.0.z)
Red Hat Enterprise Linux Workstation Supplementary (v. 6)
CVEs (cve.mitre.org): CVE-2010-1321
CVE-2010-3541
CVE-2010-3548
CVE-2010-3549
CVE-2010-3550
CVE-2010-3551
CVE-2010-3556
CVE-2010-3559
CVE-2010-3562
CVE-2010-3565
CVE-2010-3566
CVE-2010-3568
CVE-2010-3569
CVE-2010-3572
CVE-2010-3573
CVE-2010-3574

Details

Updated java-1.5.0-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 6 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and
the IBM Java 2 Software Development Kit.

This update fixes several vulnerabilities in the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit. Detailed
vulnerability descriptions are linked from the IBM "Security alerts" page,
listed in the References section. (CVE-2010-1321, CVE-2010-3541,
CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3556,
CVE-2010-3559, CVE-2010-3562, CVE-2010-3565, CVE-2010-3566, CVE-2010-3568,
CVE-2010-3569, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574)

All users of java-1.5.0-ibm are advised to upgrade to these updated
packages, containing the IBM 1.5.0 SR12-FP2 Java release. All running
instances of IBM Java must be restarted for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 2c72b07b1bed093a55ef206fac2f70c5
SHA-256: 251481059e76d2fb03bfb46201e91a476918a0ae69559f3aa8578e5325e2fcc6
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: f4e9be596a466ad5dc42f7f06b847cd2
SHA-256: 06c126296d6c060ac5a05a3988a3e2749f006e39e447040a77e6e3f6cf5375dd
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 3216af7587cec3015397379c754dfd41
SHA-256: a05b6c73a613f0c0543e4639de3f16701e9f26f4758413036976a2777b837883
java-1.5.0-ibm-javacomm-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: f6f9ae178bc64c396e4b2ab1c09dbdc2
SHA-256: b264087bcd05282a5ffffa4fc3884d8481965e9f046ec5ff5c29dd6ceef2c41b
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 3fd46176c35ea33839c3bce722184c02
SHA-256: c3e5396961e71bceab499613db1dfe62c8b4f8db8056bece43cd6dd46edcc9d1
 
x86_64:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: b211198d31f8f6f5bf2957c90ea2e3ab
SHA-256: 09e64356128a71b58c26e3449030afd51327e42768f5a44ef0dd147fef424286
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 2ee751f8e404b7f3e2f14e36832decf0
SHA-256: 8836ed37620d8466e8fc7100acf521952af5e2a78304802959faa65fc9505672
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 3216af7587cec3015397379c754dfd41
SHA-256: a05b6c73a613f0c0543e4639de3f16701e9f26f4758413036976a2777b837883
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: fd2fedf95b605b62f4c8f1f1d0d86801
SHA-256: a342b51c36297f90a80e003653ea68d4a75b4c96fbf4c07fac6734df5ecf130d
java-1.5.0-ibm-javacomm-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: a8ce39be8f4e0462d5595fd5eada6a34
SHA-256: c8595787b4b5cfe7bf8b25c30a49378c6101774c7983ef18f4d8a326f0f5c213
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 04085e0421d82c6beda275f1bd03da01
SHA-256: 1d0505268f311564958e7c6726035d5536bca8cb9a69522b779b7ceb67c25d5e
 
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)

x86_64:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: b211198d31f8f6f5bf2957c90ea2e3ab
SHA-256: 09e64356128a71b58c26e3449030afd51327e42768f5a44ef0dd147fef424286
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 2ee751f8e404b7f3e2f14e36832decf0
SHA-256: 8836ed37620d8466e8fc7100acf521952af5e2a78304802959faa65fc9505672
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 3216af7587cec3015397379c754dfd41
SHA-256: a05b6c73a613f0c0543e4639de3f16701e9f26f4758413036976a2777b837883
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: fd2fedf95b605b62f4c8f1f1d0d86801
SHA-256: a342b51c36297f90a80e003653ea68d4a75b4c96fbf4c07fac6734df5ecf130d
java-1.5.0-ibm-javacomm-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: a8ce39be8f4e0462d5595fd5eada6a34
SHA-256: c8595787b4b5cfe7bf8b25c30a49378c6101774c7983ef18f4d8a326f0f5c213
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 04085e0421d82c6beda275f1bd03da01
SHA-256: 1d0505268f311564958e7c6726035d5536bca8cb9a69522b779b7ceb67c25d5e
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 2c72b07b1bed093a55ef206fac2f70c5
SHA-256: 251481059e76d2fb03bfb46201e91a476918a0ae69559f3aa8578e5325e2fcc6
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: f4e9be596a466ad5dc42f7f06b847cd2
SHA-256: 06c126296d6c060ac5a05a3988a3e2749f006e39e447040a77e6e3f6cf5375dd
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 3216af7587cec3015397379c754dfd41
SHA-256: a05b6c73a613f0c0543e4639de3f16701e9f26f4758413036976a2777b837883
java-1.5.0-ibm-javacomm-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: f6f9ae178bc64c396e4b2ab1c09dbdc2
SHA-256: b264087bcd05282a5ffffa4fc3884d8481965e9f046ec5ff5c29dd6ceef2c41b
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 3fd46176c35ea33839c3bce722184c02
SHA-256: c3e5396961e71bceab499613db1dfe62c8b4f8db8056bece43cd6dd46edcc9d1
 
PPC:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 3441814d49c61fb609ed03e92fcdb576
SHA-256: e21fd1cc6e9ffe8de105651882071c6d3b882048055083b140cb537626548699
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 0374310748b50423b6f027dc2d0f3bd9
SHA-256: 8784ae41daec7a70bf3b8f4f74643aa9810f97c4dd70f09c791fd4b118075e53
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.ppc.rpm
File outdated by:  RHSA-2014:0136
    MD5: 57590c5cb0d40cab1a23ac9bc29c40df
SHA-256: 417be4ece20ac1503e9be60264b4643ce8fed527cd971a3273cc27e34d456764
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 90a2096a41597d73ba871dc23a937474
SHA-256: 2ff5bb839ac1ffee329ae8efaa78a10e6fa1fc3fe3ca8efece6835828f9cb7e2
java-1.5.0-ibm-javacomm-1.5.0.12.2-1jpp.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 8e2ff135f4de3454f2985621608e4d17
SHA-256: f42ca95560dd0495186930e8640d62b69c79f3a532bb50d6d81484723d920037
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.ppc64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 50ce209c8c1dabc1dde4cbf3c592b0a4
SHA-256: 372a9d5d2578210d63edab5be164c5561fa58fdee83bf8e88ccb091784dfa5c0
 
s390x:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0136
    MD5: 79f9431290f1807cc88e8c19fd71a9ac
SHA-256: f18d2166b7dc56a1cec3b0ea7d624d94e7495e4c318131696e79e21845d96e7f
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0136
    MD5: a7ed83cbdc6ab5aaa62eed69f3efa1f3
SHA-256: d909ae7c15ea1e4e9326aac84f6eb71a17e0345c9cdc0618cfbc894e145f62a6
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.s390.rpm
File outdated by:  RHSA-2014:0136
    MD5: d36e79c4f5ec0aabdacbea4304049b4a
SHA-256: 308dc9d39b6351fc4abbad1be00985d553780f82aad20f76b563477f27abd9f7
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0136
    MD5: b4260fb7fb177f1e1525dba78d0bcff6
SHA-256: 516a7a678b7d42603b7168d7f7384061b814aa1ca97d0e3a5f38daaa558cc1f2
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.s390x.rpm
File outdated by:  RHSA-2014:0136
    MD5: 65f3247f7da2f62d5f93c864498abeec
SHA-256: 10d3633039d158eea57a139ee895e9be9b0d4b5895c586d85b603a6a60a80342
 
x86_64:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: b211198d31f8f6f5bf2957c90ea2e3ab
SHA-256: 09e64356128a71b58c26e3449030afd51327e42768f5a44ef0dd147fef424286
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 2ee751f8e404b7f3e2f14e36832decf0
SHA-256: 8836ed37620d8466e8fc7100acf521952af5e2a78304802959faa65fc9505672
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 3216af7587cec3015397379c754dfd41
SHA-256: a05b6c73a613f0c0543e4639de3f16701e9f26f4758413036976a2777b837883
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: fd2fedf95b605b62f4c8f1f1d0d86801
SHA-256: a342b51c36297f90a80e003653ea68d4a75b4c96fbf4c07fac6734df5ecf130d
java-1.5.0-ibm-javacomm-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: a8ce39be8f4e0462d5595fd5eada6a34
SHA-256: c8595787b4b5cfe7bf8b25c30a49378c6101774c7983ef18f4d8a326f0f5c213
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 04085e0421d82c6beda275f1bd03da01
SHA-256: 1d0505268f311564958e7c6726035d5536bca8cb9a69522b779b7ceb67c25d5e
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.0.z)

IA-32:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2011:0364
    MD5: 2c72b07b1bed093a55ef206fac2f70c5
SHA-256: 251481059e76d2fb03bfb46201e91a476918a0ae69559f3aa8578e5325e2fcc6
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2011:0364
    MD5: f4e9be596a466ad5dc42f7f06b847cd2
SHA-256: 06c126296d6c060ac5a05a3988a3e2749f006e39e447040a77e6e3f6cf5375dd
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2011:0364
    MD5: 3216af7587cec3015397379c754dfd41
SHA-256: a05b6c73a613f0c0543e4639de3f16701e9f26f4758413036976a2777b837883
java-1.5.0-ibm-javacomm-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2011:0364
    MD5: f6f9ae178bc64c396e4b2ab1c09dbdc2
SHA-256: b264087bcd05282a5ffffa4fc3884d8481965e9f046ec5ff5c29dd6ceef2c41b
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2011:0364
    MD5: 3fd46176c35ea33839c3bce722184c02
SHA-256: c3e5396961e71bceab499613db1dfe62c8b4f8db8056bece43cd6dd46edcc9d1
 
PPC:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.ppc64.rpm
File outdated by:  RHSA-2011:0364
    MD5: 3441814d49c61fb609ed03e92fcdb576
SHA-256: e21fd1cc6e9ffe8de105651882071c6d3b882048055083b140cb537626548699
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.ppc64.rpm
File outdated by:  RHSA-2011:0364
    MD5: 0374310748b50423b6f027dc2d0f3bd9
SHA-256: 8784ae41daec7a70bf3b8f4f74643aa9810f97c4dd70f09c791fd4b118075e53
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.ppc.rpm
File outdated by:  RHSA-2011:0364
    MD5: 57590c5cb0d40cab1a23ac9bc29c40df
SHA-256: 417be4ece20ac1503e9be60264b4643ce8fed527cd971a3273cc27e34d456764
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.ppc64.rpm
File outdated by:  RHSA-2011:0364
    MD5: 90a2096a41597d73ba871dc23a937474
SHA-256: 2ff5bb839ac1ffee329ae8efaa78a10e6fa1fc3fe3ca8efece6835828f9cb7e2
java-1.5.0-ibm-javacomm-1.5.0.12.2-1jpp.1.el6.ppc64.rpm
File outdated by:  RHSA-2011:0364
    MD5: 8e2ff135f4de3454f2985621608e4d17
SHA-256: f42ca95560dd0495186930e8640d62b69c79f3a532bb50d6d81484723d920037
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.ppc64.rpm
File outdated by:  RHSA-2011:0364
    MD5: 50ce209c8c1dabc1dde4cbf3c592b0a4
SHA-256: 372a9d5d2578210d63edab5be164c5561fa58fdee83bf8e88ccb091784dfa5c0
 
s390x:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.s390x.rpm
File outdated by:  RHSA-2011:0364
    MD5: 79f9431290f1807cc88e8c19fd71a9ac
SHA-256: f18d2166b7dc56a1cec3b0ea7d624d94e7495e4c318131696e79e21845d96e7f
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.s390x.rpm
File outdated by:  RHSA-2011:0364
    MD5: a7ed83cbdc6ab5aaa62eed69f3efa1f3
SHA-256: d909ae7c15ea1e4e9326aac84f6eb71a17e0345c9cdc0618cfbc894e145f62a6
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.s390.rpm
File outdated by:  RHSA-2011:0364
    MD5: d36e79c4f5ec0aabdacbea4304049b4a
SHA-256: 308dc9d39b6351fc4abbad1be00985d553780f82aad20f76b563477f27abd9f7
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.s390x.rpm
File outdated by:  RHSA-2011:0364
    MD5: b4260fb7fb177f1e1525dba78d0bcff6
SHA-256: 516a7a678b7d42603b7168d7f7384061b814aa1ca97d0e3a5f38daaa558cc1f2
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.s390x.rpm
File outdated by:  RHSA-2011:0364
    MD5: 65f3247f7da2f62d5f93c864498abeec
SHA-256: 10d3633039d158eea57a139ee895e9be9b0d4b5895c586d85b603a6a60a80342
 
x86_64:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2011:0364
    MD5: b211198d31f8f6f5bf2957c90ea2e3ab
SHA-256: 09e64356128a71b58c26e3449030afd51327e42768f5a44ef0dd147fef424286
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2011:0364
    MD5: 2ee751f8e404b7f3e2f14e36832decf0
SHA-256: 8836ed37620d8466e8fc7100acf521952af5e2a78304802959faa65fc9505672
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2011:0364
    MD5: 3216af7587cec3015397379c754dfd41
SHA-256: a05b6c73a613f0c0543e4639de3f16701e9f26f4758413036976a2777b837883
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2011:0364
    MD5: fd2fedf95b605b62f4c8f1f1d0d86801
SHA-256: a342b51c36297f90a80e003653ea68d4a75b4c96fbf4c07fac6734df5ecf130d
java-1.5.0-ibm-javacomm-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2011:0364
    MD5: a8ce39be8f4e0462d5595fd5eada6a34
SHA-256: c8595787b4b5cfe7bf8b25c30a49378c6101774c7983ef18f4d8a326f0f5c213
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2011:0364
    MD5: 04085e0421d82c6beda275f1bd03da01
SHA-256: 1d0505268f311564958e7c6726035d5536bca8cb9a69522b779b7ceb67c25d5e
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 2c72b07b1bed093a55ef206fac2f70c5
SHA-256: 251481059e76d2fb03bfb46201e91a476918a0ae69559f3aa8578e5325e2fcc6
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: f4e9be596a466ad5dc42f7f06b847cd2
SHA-256: 06c126296d6c060ac5a05a3988a3e2749f006e39e447040a77e6e3f6cf5375dd
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 3216af7587cec3015397379c754dfd41
SHA-256: a05b6c73a613f0c0543e4639de3f16701e9f26f4758413036976a2777b837883
java-1.5.0-ibm-javacomm-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: f6f9ae178bc64c396e4b2ab1c09dbdc2
SHA-256: b264087bcd05282a5ffffa4fc3884d8481965e9f046ec5ff5c29dd6ceef2c41b
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 3fd46176c35ea33839c3bce722184c02
SHA-256: c3e5396961e71bceab499613db1dfe62c8b4f8db8056bece43cd6dd46edcc9d1
 
x86_64:
java-1.5.0-ibm-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: b211198d31f8f6f5bf2957c90ea2e3ab
SHA-256: 09e64356128a71b58c26e3449030afd51327e42768f5a44ef0dd147fef424286
java-1.5.0-ibm-demo-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 2ee751f8e404b7f3e2f14e36832decf0
SHA-256: 8836ed37620d8466e8fc7100acf521952af5e2a78304802959faa65fc9505672
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.i686.rpm
File outdated by:  RHSA-2014:0136
    MD5: 3216af7587cec3015397379c754dfd41
SHA-256: a05b6c73a613f0c0543e4639de3f16701e9f26f4758413036976a2777b837883
java-1.5.0-ibm-devel-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: fd2fedf95b605b62f4c8f1f1d0d86801
SHA-256: a342b51c36297f90a80e003653ea68d4a75b4c96fbf4c07fac6734df5ecf130d
java-1.5.0-ibm-javacomm-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: a8ce39be8f4e0462d5595fd5eada6a34
SHA-256: c8595787b4b5cfe7bf8b25c30a49378c6101774c7983ef18f4d8a326f0f5c213
java-1.5.0-ibm-src-1.5.0.12.2-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2014:0136
    MD5: 04085e0421d82c6beda275f1bd03da01
SHA-256: 1d0505268f311564958e7c6726035d5536bca8cb9a69522b779b7ceb67c25d5e
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

582466 - CVE-2010-1321 krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005)
639876 - CVE-2010-3568 OpenJDK Deserialization Race condition (6559775)
639897 - CVE-2010-3562 OpenJDK IndexColorModel double-free (6925710)
639909 - CVE-2010-3548 OpenJDK DNS server IP address information leak (6957564)
639920 - CVE-2010-3565 OpenJDK JPEG writeImage remote code execution (6963023)
639922 - CVE-2010-3566 OpenJDK ICC Profile remote code execution (6963489)
639925 - CVE-2010-3569 OpenJDK Serialization inconsistencies (6966692)
642180 - CVE-2010-3549 OpenJDK HttpURLConnection request splitting (6952017)
642187 - CVE-2010-3551 OpenJDK local network address disclosure (6952603)
642202 - CVE-2010-3541 CVE-2010-3573 OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)
642215 - CVE-2010-3574 OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
642559 - CVE-2010-3550 JDK unspecified vulnerability in Java Web Start component
642576 - CVE-2010-3556 JDK unspecified vulnerability in 2D component
642606 - CVE-2010-3559 JDK unspecified vulnerability in Sound component
642611 - CVE-2010-3572 JDK unspecified vulnerability in Sound component


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/