Skip to navigation

Security Advisory Critical: java-1.7.0-ibm security update

Advisory: RHSA-2012:1467-1
Type: Security Advisory
Severity: Critical
Issued on: 2012-11-15
Last updated on: 2012-11-15
Affected Products: Red Hat Enterprise Linux Desktop Supplementary (v. 6)
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation Supplementary (v. 6)
CVEs (cve.mitre.org): CVE-2011-3544
CVE-2012-1531
CVE-2012-1532
CVE-2012-1533
CVE-2012-1718
CVE-2012-3143
CVE-2012-3159
CVE-2012-3216
CVE-2012-4820
CVE-2012-4821
CVE-2012-4822
CVE-2012-4823
CVE-2012-5067
CVE-2012-5069
CVE-2012-5070
CVE-2012-5071
CVE-2012-5072
CVE-2012-5073
CVE-2012-5074
CVE-2012-5075
CVE-2012-5076
CVE-2012-5077
CVE-2012-5079
CVE-2012-5081
CVE-2012-5083
CVE-2012-5084
CVE-2012-5086
CVE-2012-5087
CVE-2012-5088
CVE-2012-5089
CVE-2013-1475

Details

Updated java-1.7.0-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 6 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM
Java Software Development Kit.

This update fixes several vulnerabilities in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Detailed
vulnerability descriptions are linked from the IBM Security alerts page,
listed in the References section. (CVE-2012-1531, CVE-2012-1532,
CVE-2012-1533, CVE-2012-1718, CVE-2012-3143, CVE-2012-3159, CVE-2012-3216,
CVE-2012-4820, CVE-2012-4821, CVE-2012-4822, CVE-2012-4823, CVE-2012-5067,
CVE-2012-5069, CVE-2012-5070, CVE-2012-5071, CVE-2012-5072, CVE-2012-5073,
CVE-2012-5074, CVE-2012-5075, CVE-2012-5076, CVE-2012-5077, CVE-2012-5079,
CVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5086, CVE-2012-5087,
CVE-2012-5088, CVE-2012-5089)

All users of java-1.7.0-ibm are advised to upgrade to these updated
packages, containing the IBM Java SE 7 SR3 release. All running instances
of IBM Java must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 84cd1cc40d3a44e58b253b482db97016
SHA-256: 4f9c302fda0441aa6474084756c12606e32d6fad9b1fd932a867947881dd1080
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: a618a4e6235265a24e5178a667897a47
SHA-256: 747c66733278b16bcc46ca8b3c2f3ea2cc02d784ffa9b8553ad02e17a9ee3792
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 3f0976b70a80313737b4d564f880dd4d
SHA-256: 3cd8278c6cc29ce1c047f93ad5b612a66b6d5cbcd4512f93f39ffa0273b291f9
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 26d52edd30d2dfefe877a45540512f0e
SHA-256: 6601d9c9e2b9a98d0fe858760ed722c14a95aac6997f375373b02299fa8bea66
java-1.7.0-ibm-plugin-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: b941fab551ad29108e131efb23054765
SHA-256: bf470e6de25fd7c411e2198ca0a8c377e28e21db477ed294cd02f72ca6a79bdf
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0780205ae66a2e56c193a7f2293ebf9a
SHA-256: 2c5b209eca49298d2f2aaa5fd9265b8dedaf8278d41708ed088693c8ecb08090
 
x86_64:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0831e25041906796f953fd845135a891
SHA-256: ff7462ddbb078a3c19c570ab0142c43ddba8f29625162871fc7aa383c06ea0ed
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a9c4520bf199213505a621a398766bb4
SHA-256: 79d6cea12343c8decc60aa932c7626e3fec153296de249e1bdf557f1262ec5c2
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: d2bf451264e7ddd1d5b5637fb1aac70a
SHA-256: 435d57c740e3ed97c77d186c4f4bdb0819e7ad50893a4c6de796c2e3e0c7b031
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a95900b79c45339d283cb8563b65dbe5
SHA-256: 0355adae8656278f7a54c38f9a7b10caf3fcc21b7f065ce4aa65f5ef4fe41634
java-1.7.0-ibm-plugin-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: c6d5a0778908a3e14f412a36e5a0ef8c
SHA-256: ed4df25f3a6f89272845629c18c9263516f6c640546687a8ea9a922fe320f905
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 9f7664160a09f146d03ef7e4e10c4af1
SHA-256: 056cb7d3b8e22ef9ec096430dacd99b5b7d28453790e7c5435a98274f03eadd3
 
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)

x86_64:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0831e25041906796f953fd845135a891
SHA-256: ff7462ddbb078a3c19c570ab0142c43ddba8f29625162871fc7aa383c06ea0ed
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a9c4520bf199213505a621a398766bb4
SHA-256: 79d6cea12343c8decc60aa932c7626e3fec153296de249e1bdf557f1262ec5c2
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: d2bf451264e7ddd1d5b5637fb1aac70a
SHA-256: 435d57c740e3ed97c77d186c4f4bdb0819e7ad50893a4c6de796c2e3e0c7b031
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 9f7664160a09f146d03ef7e4e10c4af1
SHA-256: 056cb7d3b8e22ef9ec096430dacd99b5b7d28453790e7c5435a98274f03eadd3
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 84cd1cc40d3a44e58b253b482db97016
SHA-256: 4f9c302fda0441aa6474084756c12606e32d6fad9b1fd932a867947881dd1080
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: a618a4e6235265a24e5178a667897a47
SHA-256: 747c66733278b16bcc46ca8b3c2f3ea2cc02d784ffa9b8553ad02e17a9ee3792
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 3f0976b70a80313737b4d564f880dd4d
SHA-256: 3cd8278c6cc29ce1c047f93ad5b612a66b6d5cbcd4512f93f39ffa0273b291f9
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 26d52edd30d2dfefe877a45540512f0e
SHA-256: 6601d9c9e2b9a98d0fe858760ed722c14a95aac6997f375373b02299fa8bea66
java-1.7.0-ibm-plugin-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: b941fab551ad29108e131efb23054765
SHA-256: bf470e6de25fd7c411e2198ca0a8c377e28e21db477ed294cd02f72ca6a79bdf
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0780205ae66a2e56c193a7f2293ebf9a
SHA-256: 2c5b209eca49298d2f2aaa5fd9265b8dedaf8278d41708ed088693c8ecb08090
 
PPC:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: b0d32a083df52611b8919b038588290d
SHA-256: 2e266ef8243f96591703833578a78b62623ac762b15c18e53e7a78112c85b31b
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: e1ad3d3613cab70e1ec1660860000a5c
SHA-256: 3acac6bc2551509ab58313f45b72d71a9fb7a1c2b87d7c0528c4b5697d2cad86
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a7534e6db2e6387fd55b423db8b35f11
SHA-256: 5a861c80568595a2f35cadce563999c6be50314fca0f98dad0c97e77ef50b919
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: d1d59cc208643953ef5b430d7007050b
SHA-256: 7486409f8b6c46a4f84e0177628fa8f4989ae86eb09303e621ee394036830df0
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 25a66f48f93e5a8da937a32ab13aebfa
SHA-256: 82c2a85d8bc7d1161e10168ae0e1f7d224811ad24ac2f4457a099ad1541bb1d3
 
s390x:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 1400057cf4eac09df87906bf0121c0aa
SHA-256: f7b534dec2dd43d9bcfb2101452970f0f0e0b05c1f674633065335be3d291233
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0911daa712e3f6ad09a70e7d93a0fab8
SHA-256: f60077ba9bb6d88417f458789e463b62651f28daebf7bc982d513848a197a941
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: f03908b1ce2c9580897b5bd15771fd5e
SHA-256: 25c76325a744c30d1dc904bab6ea9275b1aed44d1e3cc8c9a8b5942d69553d2f
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 019c714f43c03a8ada90238ddd74e3ab
SHA-256: 2d3f4713315e5a2c608d73d4d6752d587d024c9c4d16c1758fe541e31939562e
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 165a4b8c1b3e3cfd64667a3fb1c7965b
SHA-256: 9e77cad83996a81a7d4751b8ad069cb98384716862331bfcb7f76f5630fd3017
 
x86_64:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0831e25041906796f953fd845135a891
SHA-256: ff7462ddbb078a3c19c570ab0142c43ddba8f29625162871fc7aa383c06ea0ed
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a9c4520bf199213505a621a398766bb4
SHA-256: 79d6cea12343c8decc60aa932c7626e3fec153296de249e1bdf557f1262ec5c2
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: d2bf451264e7ddd1d5b5637fb1aac70a
SHA-256: 435d57c740e3ed97c77d186c4f4bdb0819e7ad50893a4c6de796c2e3e0c7b031
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a95900b79c45339d283cb8563b65dbe5
SHA-256: 0355adae8656278f7a54c38f9a7b10caf3fcc21b7f065ce4aa65f5ef4fe41634
java-1.7.0-ibm-plugin-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: c6d5a0778908a3e14f412a36e5a0ef8c
SHA-256: ed4df25f3a6f89272845629c18c9263516f6c640546687a8ea9a922fe320f905
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 9f7664160a09f146d03ef7e4e10c4af1
SHA-256: 056cb7d3b8e22ef9ec096430dacd99b5b7d28453790e7c5435a98274f03eadd3
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.3.z)

IA-32:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.i686.rpm     MD5: 84cd1cc40d3a44e58b253b482db97016
SHA-256: 4f9c302fda0441aa6474084756c12606e32d6fad9b1fd932a867947881dd1080
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.i686.rpm     MD5: a618a4e6235265a24e5178a667897a47
SHA-256: 747c66733278b16bcc46ca8b3c2f3ea2cc02d784ffa9b8553ad02e17a9ee3792
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.i686.rpm     MD5: 3f0976b70a80313737b4d564f880dd4d
SHA-256: 3cd8278c6cc29ce1c047f93ad5b612a66b6d5cbcd4512f93f39ffa0273b291f9
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.i686.rpm     MD5: 26d52edd30d2dfefe877a45540512f0e
SHA-256: 6601d9c9e2b9a98d0fe858760ed722c14a95aac6997f375373b02299fa8bea66
java-1.7.0-ibm-plugin-1.7.0.3.0-1jpp.2.el6_3.i686.rpm     MD5: b941fab551ad29108e131efb23054765
SHA-256: bf470e6de25fd7c411e2198ca0a8c377e28e21db477ed294cd02f72ca6a79bdf
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.i686.rpm     MD5: 0780205ae66a2e56c193a7f2293ebf9a
SHA-256: 2c5b209eca49298d2f2aaa5fd9265b8dedaf8278d41708ed088693c8ecb08090
 
PPC:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.ppc64.rpm     MD5: b0d32a083df52611b8919b038588290d
SHA-256: 2e266ef8243f96591703833578a78b62623ac762b15c18e53e7a78112c85b31b
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.ppc64.rpm     MD5: e1ad3d3613cab70e1ec1660860000a5c
SHA-256: 3acac6bc2551509ab58313f45b72d71a9fb7a1c2b87d7c0528c4b5697d2cad86
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.ppc64.rpm     MD5: a7534e6db2e6387fd55b423db8b35f11
SHA-256: 5a861c80568595a2f35cadce563999c6be50314fca0f98dad0c97e77ef50b919
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.ppc64.rpm     MD5: d1d59cc208643953ef5b430d7007050b
SHA-256: 7486409f8b6c46a4f84e0177628fa8f4989ae86eb09303e621ee394036830df0
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.ppc64.rpm     MD5: 25a66f48f93e5a8da937a32ab13aebfa
SHA-256: 82c2a85d8bc7d1161e10168ae0e1f7d224811ad24ac2f4457a099ad1541bb1d3
 
s390x:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.s390x.rpm     MD5: 1400057cf4eac09df87906bf0121c0aa
SHA-256: f7b534dec2dd43d9bcfb2101452970f0f0e0b05c1f674633065335be3d291233
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.s390x.rpm     MD5: 0911daa712e3f6ad09a70e7d93a0fab8
SHA-256: f60077ba9bb6d88417f458789e463b62651f28daebf7bc982d513848a197a941
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.s390x.rpm     MD5: f03908b1ce2c9580897b5bd15771fd5e
SHA-256: 25c76325a744c30d1dc904bab6ea9275b1aed44d1e3cc8c9a8b5942d69553d2f
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.s390x.rpm     MD5: 019c714f43c03a8ada90238ddd74e3ab
SHA-256: 2d3f4713315e5a2c608d73d4d6752d587d024c9c4d16c1758fe541e31939562e
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.s390x.rpm     MD5: 165a4b8c1b3e3cfd64667a3fb1c7965b
SHA-256: 9e77cad83996a81a7d4751b8ad069cb98384716862331bfcb7f76f5630fd3017
 
x86_64:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm     MD5: 0831e25041906796f953fd845135a891
SHA-256: ff7462ddbb078a3c19c570ab0142c43ddba8f29625162871fc7aa383c06ea0ed
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm     MD5: a9c4520bf199213505a621a398766bb4
SHA-256: 79d6cea12343c8decc60aa932c7626e3fec153296de249e1bdf557f1262ec5c2
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm     MD5: d2bf451264e7ddd1d5b5637fb1aac70a
SHA-256: 435d57c740e3ed97c77d186c4f4bdb0819e7ad50893a4c6de796c2e3e0c7b031
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm     MD5: a95900b79c45339d283cb8563b65dbe5
SHA-256: 0355adae8656278f7a54c38f9a7b10caf3fcc21b7f065ce4aa65f5ef4fe41634
java-1.7.0-ibm-plugin-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm     MD5: c6d5a0778908a3e14f412a36e5a0ef8c
SHA-256: ed4df25f3a6f89272845629c18c9263516f6c640546687a8ea9a922fe320f905
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm     MD5: 9f7664160a09f146d03ef7e4e10c4af1
SHA-256: 056cb7d3b8e22ef9ec096430dacd99b5b7d28453790e7c5435a98274f03eadd3
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 84cd1cc40d3a44e58b253b482db97016
SHA-256: 4f9c302fda0441aa6474084756c12606e32d6fad9b1fd932a867947881dd1080
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: a618a4e6235265a24e5178a667897a47
SHA-256: 747c66733278b16bcc46ca8b3c2f3ea2cc02d784ffa9b8553ad02e17a9ee3792
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 3f0976b70a80313737b4d564f880dd4d
SHA-256: 3cd8278c6cc29ce1c047f93ad5b612a66b6d5cbcd4512f93f39ffa0273b291f9
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 26d52edd30d2dfefe877a45540512f0e
SHA-256: 6601d9c9e2b9a98d0fe858760ed722c14a95aac6997f375373b02299fa8bea66
java-1.7.0-ibm-plugin-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: b941fab551ad29108e131efb23054765
SHA-256: bf470e6de25fd7c411e2198ca0a8c377e28e21db477ed294cd02f72ca6a79bdf
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0780205ae66a2e56c193a7f2293ebf9a
SHA-256: 2c5b209eca49298d2f2aaa5fd9265b8dedaf8278d41708ed088693c8ecb08090
 
x86_64:
java-1.7.0-ibm-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0831e25041906796f953fd845135a891
SHA-256: ff7462ddbb078a3c19c570ab0142c43ddba8f29625162871fc7aa383c06ea0ed
java-1.7.0-ibm-demo-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a9c4520bf199213505a621a398766bb4
SHA-256: 79d6cea12343c8decc60aa932c7626e3fec153296de249e1bdf557f1262ec5c2
java-1.7.0-ibm-devel-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: d2bf451264e7ddd1d5b5637fb1aac70a
SHA-256: 435d57c740e3ed97c77d186c4f4bdb0819e7ad50893a4c6de796c2e3e0c7b031
java-1.7.0-ibm-jdbc-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: a95900b79c45339d283cb8563b65dbe5
SHA-256: 0355adae8656278f7a54c38f9a7b10caf3fcc21b7f065ce4aa65f5ef4fe41634
java-1.7.0-ibm-plugin-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: c6d5a0778908a3e14f412a36e5a0ef8c
SHA-256: ed4df25f3a6f89272845629c18c9263516f6c640546687a8ea9a922fe320f905
java-1.7.0-ibm-src-1.7.0.3.0-1jpp.2.el6_3.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 9f7664160a09f146d03ef7e4e10c4af1
SHA-256: 056cb7d3b8e22ef9ec096430dacd99b5b7d28453790e7c5435a98274f03eadd3
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

829372 - CVE-2012-1718 OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)
865346 - CVE-2012-3216 OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)
865350 - CVE-2012-5070 OpenJDK: EnvHelp information disclosure (JMX, 7158796)
865352 - CVE-2012-5076 OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7163198)
865354 - CVE-2012-5077 OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656)
865357 - CVE-2012-5073 OpenJDK: LogManager security bypass (Libraries, 7169884)
865359 - CVE-2012-5074 OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7169887)
865363 - CVE-2012-5075 OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)
865365 - CVE-2012-5072 OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)
865370 - CVE-2012-5081 OpenJDK: JSSE denial of service (JSSE, 7186286)
865428 - CVE-2012-5086 OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917)
865434 - CVE-2012-5087 OpenJDK: PropertyElementHandler insufficient access checks (Beans, 7195549)
865471 - CVE-2012-5088 OpenJDK: MethodHandle insufficient access control checks (Libraries, 7196190)
865511 - CVE-2012-5084 OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)
865514 - CVE-2012-5089 OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)
865519 - CVE-2012-5071 OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)
865531 - CVE-2012-5069 OpenJDK: Executors state handling issues (Concurrency, 7189103)
865568 - CVE-2012-5079 OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)
867185 - CVE-2012-1531 Oracle JDK: unspecified vulnerability (2D)
867186 - CVE-2012-1532 Oracle JDK: unspecified vulnerability (Deployment)
867187 - CVE-2012-1533 Oracle JDK: unspecified vulnerability (Deployment)
867189 - CVE-2012-3143 Oracle JDK: unspecified vulnerability (JMX)
867190 - CVE-2012-3159 Oracle JDK: unspecified vulnerability (Deployment)
867192 - CVE-2012-5067 Oracle JDK: unspecified vulnerability (Deployment)
867193 - CVE-2012-5083 Oracle JDK: unspecified vulnerability (2D)
876386 - CVE-2012-4820 IBM JDK: java.lang.reflect.Method invoke() code execution
876387 - CVE-2012-4821 IBM JDK: getDeclaredMethods() and setAccessible() code execution
876388 - CVE-2012-4822 IBM JDK: java.lang.class code execution
876389 - CVE-2012-4823 IBM JDK: java.lang.ClassLoder defineClass() code execution


References

https://www.redhat.com/security/data/cve/CVE-2011-3544.html
https://www.redhat.com/security/data/cve/CVE-2012-1531.html
https://www.redhat.com/security/data/cve/CVE-2012-1532.html
https://www.redhat.com/security/data/cve/CVE-2012-1533.html
https://www.redhat.com/security/data/cve/CVE-2012-1718.html
https://www.redhat.com/security/data/cve/CVE-2012-3143.html
https://www.redhat.com/security/data/cve/CVE-2012-3159.html
https://www.redhat.com/security/data/cve/CVE-2012-3216.html
https://www.redhat.com/security/data/cve/CVE-2012-4820.html
https://www.redhat.com/security/data/cve/CVE-2012-4821.html
https://www.redhat.com/security/data/cve/CVE-2012-4822.html
https://www.redhat.com/security/data/cve/CVE-2012-4823.html
https://www.redhat.com/security/data/cve/CVE-2012-5067.html
https://www.redhat.com/security/data/cve/CVE-2012-5069.html
https://www.redhat.com/security/data/cve/CVE-2012-5070.html
https://www.redhat.com/security/data/cve/CVE-2012-5071.html
https://www.redhat.com/security/data/cve/CVE-2012-5072.html
https://www.redhat.com/security/data/cve/CVE-2012-5073.html
https://www.redhat.com/security/data/cve/CVE-2012-5074.html
https://www.redhat.com/security/data/cve/CVE-2012-5075.html
https://www.redhat.com/security/data/cve/CVE-2012-5076.html
https://www.redhat.com/security/data/cve/CVE-2012-5077.html
https://www.redhat.com/security/data/cve/CVE-2012-5079.html
https://www.redhat.com/security/data/cve/CVE-2012-5081.html
https://www.redhat.com/security/data/cve/CVE-2012-5083.html
https://www.redhat.com/security/data/cve/CVE-2012-5084.html
https://www.redhat.com/security/data/cve/CVE-2012-5086.html
https://www.redhat.com/security/data/cve/CVE-2012-5087.html
https://www.redhat.com/security/data/cve/CVE-2012-5088.html
https://www.redhat.com/security/data/cve/CVE-2012-5089.html
https://www.redhat.com/security/data/cve/CVE-2013-1475.html
https://access.redhat.com/security/updates/classification/#critical
https://www.ibm.com/developerworks/java/jdk/alerts/


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/