Skip to navigation

Security Advisory Critical: java-1.7.0-ibm security update

Advisory: RHSA-2012:1289-1
Type: Security Advisory
Severity: Critical
Issued on: 2012-09-18
Last updated on: 2012-09-18
Affected Products: Red Hat Enterprise Linux Desktop Supplementary (v. 6)
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation Supplementary (v. 6)
CVEs (cve.mitre.org): CVE-2012-0547
CVE-2012-0551
CVE-2012-1682
CVE-2012-1713
CVE-2012-1716
CVE-2012-1717
CVE-2012-1719
CVE-2012-1721
CVE-2012-1722
CVE-2012-1725
CVE-2012-1726
CVE-2012-3136
CVE-2012-4681

Details

Updated java-1.7.0-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 6 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM
Java Software Development Kit.

This update fixes several vulnerabilities in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Detailed
vulnerability descriptions are linked from the IBM Security alerts page,
listed in the References section. (CVE-2012-0547, CVE-2012-0551,
CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1719,
CVE-2012-1721, CVE-2012-1722, CVE-2012-1725, CVE-2012-1726, CVE-2012-3136,
CVE-2012-4681)

All users of java-1.7.0-ibm are advised to upgrade to these updated
packages, containing the IBM Java SE 7 SR2 release. All running instances
of IBM Java must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 2525a74c62c9e92827bb17e8ddc63543
SHA-256: 82fa0a57a422eb8679a0304af50134003acbf049d4db57c9c8cb0326fe6373cd
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 561ec107b99b94443d085a18e2c7815e
SHA-256: 49b9e480de1daeb8c02626d9349ff5ecb88be695b174171c52fd3b714f087139
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0d78e126f6b076b40f2569550e3c3f95
SHA-256: 1ca906621995b7d9307d686670b0f7b58ae41879a69f9c5c620d5290f196e13d
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 34c8aeda2daffc9b9f041eb297fde74b
SHA-256: a312184e3abf96fdbb7997fe8b84dc024329b1791042e4c5e550e5a00714697c
java-1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 9dc3648f4afa8b31e730d78115cb5b79
SHA-256: f65b9e08b1a71eb466795edf551c464593ef97bd27d36c98504fca362f25d97a
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 6bceadf64e604f4f092f1a5870aa9217
SHA-256: d83cc75ac6605f895c1874a2578a43b8b53eca0ab6ec97efbabee7728af2ae29
 
x86_64:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 71487b1b4339a8afc5fef404c7b8fe34
SHA-256: aa36827411a7ab7043f2400b2ea093073ed3e84e5a811832f533e19cb3371cb2
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 354c4dd21ff1a7bd7f3ee1cb5a4b75f7
SHA-256: f0ac85442a380f77b25efed12edd298b8b26b812929080b877f9f75a86416c62
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 55b29fc43cfd643a0c375af91262d2f7
SHA-256: 37cf6bfcda7aee5e1b897c40171bcf9cabe83d74d2a18f5b0547730c1efda23d
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a1eaf9e4a966b9c70c5aed724ddf61c5
SHA-256: aeaf9deaf0043d88152668b8c4e99fa55e6aaa340b6eae52e6990639806f1dae
java-1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a699144ccf419b803d8b3d88db231a2d
SHA-256: 2fc2992798b1bf5e265b3f615a4d6ceff5e8000a6408f57cf6a6d709d19ef5c3
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 693699454a3bb33adf529ca99997303b
SHA-256: 7e6001dcbd47fe173e7424340e88ff420f47c1cb6eaa9c9e08b570164828df49
 
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)

x86_64:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 71487b1b4339a8afc5fef404c7b8fe34
SHA-256: aa36827411a7ab7043f2400b2ea093073ed3e84e5a811832f533e19cb3371cb2
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 354c4dd21ff1a7bd7f3ee1cb5a4b75f7
SHA-256: f0ac85442a380f77b25efed12edd298b8b26b812929080b877f9f75a86416c62
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 55b29fc43cfd643a0c375af91262d2f7
SHA-256: 37cf6bfcda7aee5e1b897c40171bcf9cabe83d74d2a18f5b0547730c1efda23d
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 693699454a3bb33adf529ca99997303b
SHA-256: 7e6001dcbd47fe173e7424340e88ff420f47c1cb6eaa9c9e08b570164828df49
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 2525a74c62c9e92827bb17e8ddc63543
SHA-256: 82fa0a57a422eb8679a0304af50134003acbf049d4db57c9c8cb0326fe6373cd
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 561ec107b99b94443d085a18e2c7815e
SHA-256: 49b9e480de1daeb8c02626d9349ff5ecb88be695b174171c52fd3b714f087139
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0d78e126f6b076b40f2569550e3c3f95
SHA-256: 1ca906621995b7d9307d686670b0f7b58ae41879a69f9c5c620d5290f196e13d
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 34c8aeda2daffc9b9f041eb297fde74b
SHA-256: a312184e3abf96fdbb7997fe8b84dc024329b1791042e4c5e550e5a00714697c
java-1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 9dc3648f4afa8b31e730d78115cb5b79
SHA-256: f65b9e08b1a71eb466795edf551c464593ef97bd27d36c98504fca362f25d97a
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 6bceadf64e604f4f092f1a5870aa9217
SHA-256: d83cc75ac6605f895c1874a2578a43b8b53eca0ab6ec97efbabee7728af2ae29
 
PPC:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: e116238b2b6227e88a7d53df41a4ab4c
SHA-256: a8ba3107455e3f705f0c507c161e16015f7ae4748dc1ca3f1e5062638ae478e2
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 1ff577b6a7ab4d6a37b4e5372acfe520
SHA-256: 2fda7389b72fda705df3a284a07d212eb103b5add47b46e2a8293c714d166047
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 837fb3674f9888ceef9262c08c1fa163
SHA-256: e375a0e5b8556174c979222b087af8bf0b41b9b2bec314770a859553727f9f76
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: c1c26b15ad124983de083490b8bcc87d
SHA-256: be8d1535c9499b9a85ca2869dbd214db21d014093d3997d877ac415ff0bb2d0b
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 55ed3389477bc4244f7c260c9c96ed16
SHA-256: 37c40aa7c52661c010b6d3f6d39a7183c47292a972e8310a89030d953115a997
 
s390x:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: a548e033fcbd0751634f101ec9f61b83
SHA-256: f5c2d7a9fd070b0c135186ce6eabee1bb043f75c29ddd3a0467bded0ce08a81b
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 3616eee15c6a4b044f4f209e71a269d3
SHA-256: 70e8eb7fa248cd3cc74eb050e8357d6496560de09aa4799e688ed3b4a59cbe4c
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: a3e899fbb0901564cf119e3221f0ef0b
SHA-256: 4764009360bec7c5be375c76308529d93a62f5e1077ba3ffc1ebd504a903d7f6
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 5d3ea553f1f88523d259cd83590a7770
SHA-256: 13f0c1745d7d056332655c64bc9d7b7e7bbb7ef47dcccea49df9e3af073bef4e
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 81b9dc284a666d59ac263df4dcecfe79
SHA-256: db5886e1971f3dbdcd37a266411cfa0577885d96674c48c55b9351d2616e865e
 
x86_64:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 71487b1b4339a8afc5fef404c7b8fe34
SHA-256: aa36827411a7ab7043f2400b2ea093073ed3e84e5a811832f533e19cb3371cb2
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 354c4dd21ff1a7bd7f3ee1cb5a4b75f7
SHA-256: f0ac85442a380f77b25efed12edd298b8b26b812929080b877f9f75a86416c62
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 55b29fc43cfd643a0c375af91262d2f7
SHA-256: 37cf6bfcda7aee5e1b897c40171bcf9cabe83d74d2a18f5b0547730c1efda23d
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a1eaf9e4a966b9c70c5aed724ddf61c5
SHA-256: aeaf9deaf0043d88152668b8c4e99fa55e6aaa340b6eae52e6990639806f1dae
java-1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a699144ccf419b803d8b3d88db231a2d
SHA-256: 2fc2992798b1bf5e265b3f615a4d6ceff5e8000a6408f57cf6a6d709d19ef5c3
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 693699454a3bb33adf529ca99997303b
SHA-256: 7e6001dcbd47fe173e7424340e88ff420f47c1cb6eaa9c9e08b570164828df49
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.3.z)

IA-32:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2012:1467
    MD5: 2525a74c62c9e92827bb17e8ddc63543
SHA-256: 82fa0a57a422eb8679a0304af50134003acbf049d4db57c9c8cb0326fe6373cd
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2012:1467
    MD5: 561ec107b99b94443d085a18e2c7815e
SHA-256: 49b9e480de1daeb8c02626d9349ff5ecb88be695b174171c52fd3b714f087139
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2012:1467
    MD5: 0d78e126f6b076b40f2569550e3c3f95
SHA-256: 1ca906621995b7d9307d686670b0f7b58ae41879a69f9c5c620d5290f196e13d
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2012:1467
    MD5: 34c8aeda2daffc9b9f041eb297fde74b
SHA-256: a312184e3abf96fdbb7997fe8b84dc024329b1791042e4c5e550e5a00714697c
java-1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2012:1467
    MD5: 9dc3648f4afa8b31e730d78115cb5b79
SHA-256: f65b9e08b1a71eb466795edf551c464593ef97bd27d36c98504fca362f25d97a
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2012:1467
    MD5: 6bceadf64e604f4f092f1a5870aa9217
SHA-256: d83cc75ac6605f895c1874a2578a43b8b53eca0ab6ec97efbabee7728af2ae29
 
PPC:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.ppc64.rpm
File outdated by:  RHSA-2012:1467
    MD5: e116238b2b6227e88a7d53df41a4ab4c
SHA-256: a8ba3107455e3f705f0c507c161e16015f7ae4748dc1ca3f1e5062638ae478e2
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.ppc64.rpm
File outdated by:  RHSA-2012:1467
    MD5: 1ff577b6a7ab4d6a37b4e5372acfe520
SHA-256: 2fda7389b72fda705df3a284a07d212eb103b5add47b46e2a8293c714d166047
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.ppc64.rpm
File outdated by:  RHSA-2012:1467
    MD5: 837fb3674f9888ceef9262c08c1fa163
SHA-256: e375a0e5b8556174c979222b087af8bf0b41b9b2bec314770a859553727f9f76
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.ppc64.rpm
File outdated by:  RHSA-2012:1467
    MD5: c1c26b15ad124983de083490b8bcc87d
SHA-256: be8d1535c9499b9a85ca2869dbd214db21d014093d3997d877ac415ff0bb2d0b
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.ppc64.rpm
File outdated by:  RHSA-2012:1467
    MD5: 55ed3389477bc4244f7c260c9c96ed16
SHA-256: 37c40aa7c52661c010b6d3f6d39a7183c47292a972e8310a89030d953115a997
 
s390x:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.s390x.rpm
File outdated by:  RHSA-2012:1467
    MD5: a548e033fcbd0751634f101ec9f61b83
SHA-256: f5c2d7a9fd070b0c135186ce6eabee1bb043f75c29ddd3a0467bded0ce08a81b
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.s390x.rpm
File outdated by:  RHSA-2012:1467
    MD5: 3616eee15c6a4b044f4f209e71a269d3
SHA-256: 70e8eb7fa248cd3cc74eb050e8357d6496560de09aa4799e688ed3b4a59cbe4c
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.s390x.rpm
File outdated by:  RHSA-2012:1467
    MD5: a3e899fbb0901564cf119e3221f0ef0b
SHA-256: 4764009360bec7c5be375c76308529d93a62f5e1077ba3ffc1ebd504a903d7f6
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.s390x.rpm
File outdated by:  RHSA-2012:1467
    MD5: 5d3ea553f1f88523d259cd83590a7770
SHA-256: 13f0c1745d7d056332655c64bc9d7b7e7bbb7ef47dcccea49df9e3af073bef4e
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.s390x.rpm
File outdated by:  RHSA-2012:1467
    MD5: 81b9dc284a666d59ac263df4dcecfe79
SHA-256: db5886e1971f3dbdcd37a266411cfa0577885d96674c48c55b9351d2616e865e
 
x86_64:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2012:1467
    MD5: 71487b1b4339a8afc5fef404c7b8fe34
SHA-256: aa36827411a7ab7043f2400b2ea093073ed3e84e5a811832f533e19cb3371cb2
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2012:1467
    MD5: 354c4dd21ff1a7bd7f3ee1cb5a4b75f7
SHA-256: f0ac85442a380f77b25efed12edd298b8b26b812929080b877f9f75a86416c62
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2012:1467
    MD5: 55b29fc43cfd643a0c375af91262d2f7
SHA-256: 37cf6bfcda7aee5e1b897c40171bcf9cabe83d74d2a18f5b0547730c1efda23d
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2012:1467
    MD5: a1eaf9e4a966b9c70c5aed724ddf61c5
SHA-256: aeaf9deaf0043d88152668b8c4e99fa55e6aaa340b6eae52e6990639806f1dae
java-1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2012:1467
    MD5: a699144ccf419b803d8b3d88db231a2d
SHA-256: 2fc2992798b1bf5e265b3f615a4d6ceff5e8000a6408f57cf6a6d709d19ef5c3
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2012:1467
    MD5: 693699454a3bb33adf529ca99997303b
SHA-256: 7e6001dcbd47fe173e7424340e88ff420f47c1cb6eaa9c9e08b570164828df49
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 2525a74c62c9e92827bb17e8ddc63543
SHA-256: 82fa0a57a422eb8679a0304af50134003acbf049d4db57c9c8cb0326fe6373cd
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 561ec107b99b94443d085a18e2c7815e
SHA-256: 49b9e480de1daeb8c02626d9349ff5ecb88be695b174171c52fd3b714f087139
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0d78e126f6b076b40f2569550e3c3f95
SHA-256: 1ca906621995b7d9307d686670b0f7b58ae41879a69f9c5c620d5290f196e13d
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 34c8aeda2daffc9b9f041eb297fde74b
SHA-256: a312184e3abf96fdbb7997fe8b84dc024329b1791042e4c5e550e5a00714697c
java-1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 9dc3648f4afa8b31e730d78115cb5b79
SHA-256: f65b9e08b1a71eb466795edf551c464593ef97bd27d36c98504fca362f25d97a
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 6bceadf64e604f4f092f1a5870aa9217
SHA-256: d83cc75ac6605f895c1874a2578a43b8b53eca0ab6ec97efbabee7728af2ae29
 
x86_64:
java-1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 71487b1b4339a8afc5fef404c7b8fe34
SHA-256: aa36827411a7ab7043f2400b2ea093073ed3e84e5a811832f533e19cb3371cb2
java-1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 354c4dd21ff1a7bd7f3ee1cb5a4b75f7
SHA-256: f0ac85442a380f77b25efed12edd298b8b26b812929080b877f9f75a86416c62
java-1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 55b29fc43cfd643a0c375af91262d2f7
SHA-256: 37cf6bfcda7aee5e1b897c40171bcf9cabe83d74d2a18f5b0547730c1efda23d
java-1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a1eaf9e4a966b9c70c5aed724ddf61c5
SHA-256: aeaf9deaf0043d88152668b8c4e99fa55e6aaa340b6eae52e6990639806f1dae
java-1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a699144ccf419b803d8b3d88db231a2d
SHA-256: 2fc2992798b1bf5e265b3f615a4d6ceff5e8000a6408f57cf6a6d709d19ef5c3
java-1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 693699454a3bb33adf529ca99997303b
SHA-256: 7e6001dcbd47fe173e7424340e88ff420f47c1cb6eaa9c9e08b570164828df49
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

829358 - CVE-2012-1717 OpenJDK: insecure temporary file permissions (JRE, 7143606)
829360 - CVE-2012-1716 OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)
829361 - CVE-2012-1713 OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)
829371 - CVE-2012-1719 OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)
829376 - CVE-2012-1725 OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757)
829377 - CVE-2012-1726 OpenJDK: java.lang.invoke.MethodHandles.Lookup does not honor access modes (Libraries, 7165628)
831353 - CVE-2012-1721 Oracle JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)
831354 - CVE-2012-1722 Oracle JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)
831355 - CVE-2012-0551 Oracle JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)
852051 - CVE-2012-4681 OpenJDK: beans insufficient permission checks, Java 7 0day (beans, 7162473)
853097 - CVE-2012-1682 OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)
853138 - CVE-2012-3136 OpenJDK: beans MethodElementHandler insufficient permission checks (beans, 7194567)
853228 - CVE-2012-0547 OpenJDK: AWT hardening fixes (AWT, 7163201)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/