Skip to navigation

Security Advisory Critical: java-1.6.0-sun security update

Advisory: RHSA-2013:0236-1
Type: Security Advisory
Severity: Critical
Issued on: 2013-02-04
Last updated on: 2013-02-04
Affected Products: RHEL Desktop Supplementary (v. 5 client)
RHEL Supplementary (v. 5 server)
Red Hat Enterprise Linux Desktop Supplementary (v. 6)
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation Supplementary (v. 6)
CVEs (cve.mitre.org): CVE-2012-1541
CVE-2012-3213
CVE-2012-3342
CVE-2013-0351
CVE-2013-0409
CVE-2013-0419
CVE-2013-0423
CVE-2013-0424
CVE-2013-0425
CVE-2013-0426
CVE-2013-0427
CVE-2013-0428
CVE-2013-0429
CVE-2013-0430
CVE-2013-0432
CVE-2013-0433
CVE-2013-0434
CVE-2013-0435
CVE-2013-0438
CVE-2013-0440
CVE-2013-0441
CVE-2013-0442
CVE-2013-0443
CVE-2013-0445
CVE-2013-0446
CVE-2013-0450
CVE-2013-1473
CVE-2013-1475
CVE-2013-1476
CVE-2013-1478
CVE-2013-1480
CVE-2013-1481

Details

Updated java-1.6.0-sun packages that fix several security issues are now
available for Red Hat Enterprise Linux 5 and 6 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Oracle Java SE version 6 includes the Oracle Java Runtime Environment and
the Oracle Java Software Development Kit.

This update fixes several vulnerabilities in the Oracle Java Runtime
Environment and the Oracle Java Software Development Kit. Further
information about these flaws can be found on the Oracle Java SE Critical
Patch Update Advisory page, listed in the References section.
(CVE-2012-1541, CVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0409,
CVE-2013-0419, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426,
CVE-2013-0427, CVE-2013-0428, CVE-2013-0429, CVE-2013-0430, CVE-2013-0432,
CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438, CVE-2013-0440,
CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445, CVE-2013-0446,
CVE-2013-0450, CVE-2013-1473, CVE-2013-1475, CVE-2013-1476, CVE-2013-1478,
CVE-2013-1480, CVE-2013-1481)

All users of java-1.6.0-sun are advised to upgrade to these updated
packages, which provide Oracle Java 6 Update 39. All running instances of
Oracle Java must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Desktop Supplementary (v. 5 client)

IA-32:
java-1.6.0-sun-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: d2ec90f5d9e0c4d162a39f059ea2b670
SHA-256: 7489a2eb42a263faa42f5855f7880d177504b289bc5d8a26c589c6d66f8b81ef
java-1.6.0-sun-demo-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: 28487125c3a10d774dc506589b7434d7
SHA-256: a240ca5905b6da4c33dc3fa01cc244541993c5456344eee74ce126f5c18661a5
java-1.6.0-sun-devel-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: 5ecca39d88cc4c013b45ad87515e484c
SHA-256: ba5b239a85e283e4b1e4151d590b5cfa8ee42ed826b66b30f5f063f586ab484d
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: edd3b387ccb7c7e18634bceca8e42300
SHA-256: 93532f88b9d6cb314a903f10b7f5a28c00825f0751196cc9389ce66763550b8c
java-1.6.0-sun-plugin-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: b96b28a9df30e945c208dbef0a92cf80
SHA-256: 32b20d6061a2fc270751737b636dc8c2bfc2971ee05bd1bfbbcd1b0c05ab9dd6
java-1.6.0-sun-src-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: e0341eae3504a2f89ce39c9bb1ecc476
SHA-256: 4a18b44214e914c13271cb17edf8f9c5a6304a6d26f8d8a70d6827f4aacf98dd
 
x86_64:
java-1.6.0-sun-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: d2ec90f5d9e0c4d162a39f059ea2b670
SHA-256: 7489a2eb42a263faa42f5855f7880d177504b289bc5d8a26c589c6d66f8b81ef
java-1.6.0-sun-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: 233f6262d54e084ca7bf186b93b9ae9a
SHA-256: 85315003d90d21cdd00d9b062384897bf9f3a9d2691917e16d008158ef875994
java-1.6.0-sun-demo-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: 28487125c3a10d774dc506589b7434d7
SHA-256: a240ca5905b6da4c33dc3fa01cc244541993c5456344eee74ce126f5c18661a5
java-1.6.0-sun-demo-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: 8baa7d82d1cdca2b7512e1f3394c11b3
SHA-256: 9aafb86faf1a805ec0dd3c85ea68111fc07beb5fd8d6353f7b0db94edd076e0c
java-1.6.0-sun-devel-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: 5ecca39d88cc4c013b45ad87515e484c
SHA-256: ba5b239a85e283e4b1e4151d590b5cfa8ee42ed826b66b30f5f063f586ab484d
java-1.6.0-sun-devel-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: 86d55ada0e8c3fbc8c8623ed63c1cf9e
SHA-256: 3ab03468a1b07307d4e9514748d62d7fb0e18ba0280b8beb0dae7deab2de73a0
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: edd3b387ccb7c7e18634bceca8e42300
SHA-256: 93532f88b9d6cb314a903f10b7f5a28c00825f0751196cc9389ce66763550b8c
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: b192d458b27f587d3820d56c94cf4018
SHA-256: 6e2d2b7c8a30958a0c06d0a6f595629b37d882cfbf6e23c80dd10e24522eb45d
java-1.6.0-sun-plugin-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: b96b28a9df30e945c208dbef0a92cf80
SHA-256: 32b20d6061a2fc270751737b636dc8c2bfc2971ee05bd1bfbbcd1b0c05ab9dd6
java-1.6.0-sun-plugin-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: 59eaabc69b1f6a64e4658fe86211d45e
SHA-256: 434e45cd8dc7e6ea687fd80cde20e12e2baf6d15bc37fce021c9a2174975b85b
java-1.6.0-sun-src-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: e0341eae3504a2f89ce39c9bb1ecc476
SHA-256: 4a18b44214e914c13271cb17edf8f9c5a6304a6d26f8d8a70d6827f4aacf98dd
java-1.6.0-sun-src-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: 3d373ec3f412e63b04c14ace1d5c0cc8
SHA-256: 731355db24e964f609d11eba9d54c53927e60a10d3890c657a71b273db2b056c
 
RHEL Supplementary (v. 5 server)

IA-32:
java-1.6.0-sun-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: d2ec90f5d9e0c4d162a39f059ea2b670
SHA-256: 7489a2eb42a263faa42f5855f7880d177504b289bc5d8a26c589c6d66f8b81ef
java-1.6.0-sun-demo-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: 28487125c3a10d774dc506589b7434d7
SHA-256: a240ca5905b6da4c33dc3fa01cc244541993c5456344eee74ce126f5c18661a5
java-1.6.0-sun-devel-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: 5ecca39d88cc4c013b45ad87515e484c
SHA-256: ba5b239a85e283e4b1e4151d590b5cfa8ee42ed826b66b30f5f063f586ab484d
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: edd3b387ccb7c7e18634bceca8e42300
SHA-256: 93532f88b9d6cb314a903f10b7f5a28c00825f0751196cc9389ce66763550b8c
java-1.6.0-sun-plugin-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: b96b28a9df30e945c208dbef0a92cf80
SHA-256: 32b20d6061a2fc270751737b636dc8c2bfc2971ee05bd1bfbbcd1b0c05ab9dd6
java-1.6.0-sun-src-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: e0341eae3504a2f89ce39c9bb1ecc476
SHA-256: 4a18b44214e914c13271cb17edf8f9c5a6304a6d26f8d8a70d6827f4aacf98dd
 
x86_64:
java-1.6.0-sun-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: d2ec90f5d9e0c4d162a39f059ea2b670
SHA-256: 7489a2eb42a263faa42f5855f7880d177504b289bc5d8a26c589c6d66f8b81ef
java-1.6.0-sun-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: 233f6262d54e084ca7bf186b93b9ae9a
SHA-256: 85315003d90d21cdd00d9b062384897bf9f3a9d2691917e16d008158ef875994
java-1.6.0-sun-demo-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: 28487125c3a10d774dc506589b7434d7
SHA-256: a240ca5905b6da4c33dc3fa01cc244541993c5456344eee74ce126f5c18661a5
java-1.6.0-sun-demo-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: 8baa7d82d1cdca2b7512e1f3394c11b3
SHA-256: 9aafb86faf1a805ec0dd3c85ea68111fc07beb5fd8d6353f7b0db94edd076e0c
java-1.6.0-sun-devel-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: 5ecca39d88cc4c013b45ad87515e484c
SHA-256: ba5b239a85e283e4b1e4151d590b5cfa8ee42ed826b66b30f5f063f586ab484d
java-1.6.0-sun-devel-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: 86d55ada0e8c3fbc8c8623ed63c1cf9e
SHA-256: 3ab03468a1b07307d4e9514748d62d7fb0e18ba0280b8beb0dae7deab2de73a0
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: edd3b387ccb7c7e18634bceca8e42300
SHA-256: 93532f88b9d6cb314a903f10b7f5a28c00825f0751196cc9389ce66763550b8c
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: b192d458b27f587d3820d56c94cf4018
SHA-256: 6e2d2b7c8a30958a0c06d0a6f595629b37d882cfbf6e23c80dd10e24522eb45d
java-1.6.0-sun-plugin-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: b96b28a9df30e945c208dbef0a92cf80
SHA-256: 32b20d6061a2fc270751737b636dc8c2bfc2971ee05bd1bfbbcd1b0c05ab9dd6
java-1.6.0-sun-plugin-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: 59eaabc69b1f6a64e4658fe86211d45e
SHA-256: 434e45cd8dc7e6ea687fd80cde20e12e2baf6d15bc37fce021c9a2174975b85b
java-1.6.0-sun-src-1.6.0.39-1jpp.4.el5_9.i586.rpm     MD5: e0341eae3504a2f89ce39c9bb1ecc476
SHA-256: 4a18b44214e914c13271cb17edf8f9c5a6304a6d26f8d8a70d6827f4aacf98dd
java-1.6.0-sun-src-1.6.0.39-1jpp.4.el5_9.x86_64.rpm     MD5: 3d373ec3f412e63b04c14ace1d5c0cc8
SHA-256: 731355db24e964f609d11eba9d54c53927e60a10d3890c657a71b273db2b056c
 
Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 1732cdc32a17af9f73290c8259acb981
SHA-256: 9b55b461e9bdd18240fd6e1997880f7a95acd16a369bf05036b270399f7d6d7d
java-1.6.0-sun-demo-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: bd9da6d4a93ce85416c34817bd18fbc7
SHA-256: 7111f23a911a7bc327c2f370d6f3a83a840a2af97e9386e17b78f580fdddd59e
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: bb21dacf0ed5c64b239b6ef9ad09eee9
SHA-256: 28f8326ac1fdf67331cc918cc80dc7e95d72c44b3bd0560fef8e6c587e6f05d3
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 47e3af8df6c92f3ef1a6ee51dc99d463
SHA-256: 9b8c0966b05fb1fa7d0d3c9fd1ef8eb6715603939bd496517dfe90c9a4c2f688
java-1.6.0-sun-plugin-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: f546b20a9506b1cadc999e4cff780bac
SHA-256: f3a6de3433d8376f4e486fe1c4f8885be61b85fce1c35cdc36a4bdf6377114e7
java-1.6.0-sun-src-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 614a0f979dc8c168a2f604488a0fa51c
SHA-256: 155e1a57846a8cfeb81838d65f2e70915fe44b8678a40d992759d1e3677ff8cb
 
x86_64:
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 1732cdc32a17af9f73290c8259acb981
SHA-256: 9b55b461e9bdd18240fd6e1997880f7a95acd16a369bf05036b270399f7d6d7d
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 380c6422747d656245dd90bf09e8034b
SHA-256: 001434d1ee215ca6e9ca910764be66f41357d4e6d471e84b29bd8bf0f0c36cc4
java-1.6.0-sun-demo-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 301faa82d283709a575ff0df6c8aec80
SHA-256: 621cc283a271f43ef42edca50fda817359444c3191042de77785d064369e1ea3
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: bb21dacf0ed5c64b239b6ef9ad09eee9
SHA-256: 28f8326ac1fdf67331cc918cc80dc7e95d72c44b3bd0560fef8e6c587e6f05d3
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: d67bd57dca7090eba5af6eadcfcbdbf2
SHA-256: 040d144def66f00efd61830dcc43e3345421b77bb5b1d60ec8df9d0a88bfe8b3
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 2b87608ab11b8d0fbe0e5765be9f419f
SHA-256: 0b1ac3e6794430ba3748c57252f74dcf6f0dda037a0063c689976b7dc697dc81
java-1.6.0-sun-plugin-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 44021a6e3eb87ab8b3ac49736476ca99
SHA-256: 69703903f3e6bd6fd81765f0fbd2dc44e58af4d37115a1e4764ebc4bb353ae82
java-1.6.0-sun-src-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 3ba266c32f95dcb539134e7f0f89051d
SHA-256: fda032db88c698a040428e07713dba71b070f4bdaf4a5e1f86f7080e2ed3f2be
 
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)

x86_64:
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 1732cdc32a17af9f73290c8259acb981
SHA-256: 9b55b461e9bdd18240fd6e1997880f7a95acd16a369bf05036b270399f7d6d7d
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 380c6422747d656245dd90bf09e8034b
SHA-256: 001434d1ee215ca6e9ca910764be66f41357d4e6d471e84b29bd8bf0f0c36cc4
java-1.6.0-sun-demo-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 301faa82d283709a575ff0df6c8aec80
SHA-256: 621cc283a271f43ef42edca50fda817359444c3191042de77785d064369e1ea3
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: bb21dacf0ed5c64b239b6ef9ad09eee9
SHA-256: 28f8326ac1fdf67331cc918cc80dc7e95d72c44b3bd0560fef8e6c587e6f05d3
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: d67bd57dca7090eba5af6eadcfcbdbf2
SHA-256: 040d144def66f00efd61830dcc43e3345421b77bb5b1d60ec8df9d0a88bfe8b3
java-1.6.0-sun-src-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 3ba266c32f95dcb539134e7f0f89051d
SHA-256: fda032db88c698a040428e07713dba71b070f4bdaf4a5e1f86f7080e2ed3f2be
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 1732cdc32a17af9f73290c8259acb981
SHA-256: 9b55b461e9bdd18240fd6e1997880f7a95acd16a369bf05036b270399f7d6d7d
java-1.6.0-sun-demo-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: bd9da6d4a93ce85416c34817bd18fbc7
SHA-256: 7111f23a911a7bc327c2f370d6f3a83a840a2af97e9386e17b78f580fdddd59e
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: bb21dacf0ed5c64b239b6ef9ad09eee9
SHA-256: 28f8326ac1fdf67331cc918cc80dc7e95d72c44b3bd0560fef8e6c587e6f05d3
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 47e3af8df6c92f3ef1a6ee51dc99d463
SHA-256: 9b8c0966b05fb1fa7d0d3c9fd1ef8eb6715603939bd496517dfe90c9a4c2f688
java-1.6.0-sun-plugin-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: f546b20a9506b1cadc999e4cff780bac
SHA-256: f3a6de3433d8376f4e486fe1c4f8885be61b85fce1c35cdc36a4bdf6377114e7
java-1.6.0-sun-src-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 614a0f979dc8c168a2f604488a0fa51c
SHA-256: 155e1a57846a8cfeb81838d65f2e70915fe44b8678a40d992759d1e3677ff8cb
 
x86_64:
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 1732cdc32a17af9f73290c8259acb981
SHA-256: 9b55b461e9bdd18240fd6e1997880f7a95acd16a369bf05036b270399f7d6d7d
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 380c6422747d656245dd90bf09e8034b
SHA-256: 001434d1ee215ca6e9ca910764be66f41357d4e6d471e84b29bd8bf0f0c36cc4
java-1.6.0-sun-demo-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 301faa82d283709a575ff0df6c8aec80
SHA-256: 621cc283a271f43ef42edca50fda817359444c3191042de77785d064369e1ea3
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: bb21dacf0ed5c64b239b6ef9ad09eee9
SHA-256: 28f8326ac1fdf67331cc918cc80dc7e95d72c44b3bd0560fef8e6c587e6f05d3
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: d67bd57dca7090eba5af6eadcfcbdbf2
SHA-256: 040d144def66f00efd61830dcc43e3345421b77bb5b1d60ec8df9d0a88bfe8b3
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 2b87608ab11b8d0fbe0e5765be9f419f
SHA-256: 0b1ac3e6794430ba3748c57252f74dcf6f0dda037a0063c689976b7dc697dc81
java-1.6.0-sun-plugin-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 44021a6e3eb87ab8b3ac49736476ca99
SHA-256: 69703903f3e6bd6fd81765f0fbd2dc44e58af4d37115a1e4764ebc4bb353ae82
java-1.6.0-sun-src-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 3ba266c32f95dcb539134e7f0f89051d
SHA-256: fda032db88c698a040428e07713dba71b070f4bdaf4a5e1f86f7080e2ed3f2be
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.3.z)

IA-32:
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: 1732cdc32a17af9f73290c8259acb981
SHA-256: 9b55b461e9bdd18240fd6e1997880f7a95acd16a369bf05036b270399f7d6d7d
java-1.6.0-sun-demo-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: bd9da6d4a93ce85416c34817bd18fbc7
SHA-256: 7111f23a911a7bc327c2f370d6f3a83a840a2af97e9386e17b78f580fdddd59e
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: bb21dacf0ed5c64b239b6ef9ad09eee9
SHA-256: 28f8326ac1fdf67331cc918cc80dc7e95d72c44b3bd0560fef8e6c587e6f05d3
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: 47e3af8df6c92f3ef1a6ee51dc99d463
SHA-256: 9b8c0966b05fb1fa7d0d3c9fd1ef8eb6715603939bd496517dfe90c9a4c2f688
java-1.6.0-sun-plugin-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: f546b20a9506b1cadc999e4cff780bac
SHA-256: f3a6de3433d8376f4e486fe1c4f8885be61b85fce1c35cdc36a4bdf6377114e7
java-1.6.0-sun-src-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: 614a0f979dc8c168a2f604488a0fa51c
SHA-256: 155e1a57846a8cfeb81838d65f2e70915fe44b8678a40d992759d1e3677ff8cb
 
x86_64:
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: 1732cdc32a17af9f73290c8259acb981
SHA-256: 9b55b461e9bdd18240fd6e1997880f7a95acd16a369bf05036b270399f7d6d7d
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: 380c6422747d656245dd90bf09e8034b
SHA-256: 001434d1ee215ca6e9ca910764be66f41357d4e6d471e84b29bd8bf0f0c36cc4
java-1.6.0-sun-demo-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: 301faa82d283709a575ff0df6c8aec80
SHA-256: 621cc283a271f43ef42edca50fda817359444c3191042de77785d064369e1ea3
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0531
    MD5: bb21dacf0ed5c64b239b6ef9ad09eee9
SHA-256: 28f8326ac1fdf67331cc918cc80dc7e95d72c44b3bd0560fef8e6c587e6f05d3
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: d67bd57dca7090eba5af6eadcfcbdbf2
SHA-256: 040d144def66f00efd61830dcc43e3345421b77bb5b1d60ec8df9d0a88bfe8b3
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: 2b87608ab11b8d0fbe0e5765be9f419f
SHA-256: 0b1ac3e6794430ba3748c57252f74dcf6f0dda037a0063c689976b7dc697dc81
java-1.6.0-sun-plugin-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: 44021a6e3eb87ab8b3ac49736476ca99
SHA-256: 69703903f3e6bd6fd81765f0fbd2dc44e58af4d37115a1e4764ebc4bb353ae82
java-1.6.0-sun-src-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0531
    MD5: 3ba266c32f95dcb539134e7f0f89051d
SHA-256: fda032db88c698a040428e07713dba71b070f4bdaf4a5e1f86f7080e2ed3f2be
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 1732cdc32a17af9f73290c8259acb981
SHA-256: 9b55b461e9bdd18240fd6e1997880f7a95acd16a369bf05036b270399f7d6d7d
java-1.6.0-sun-demo-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: bd9da6d4a93ce85416c34817bd18fbc7
SHA-256: 7111f23a911a7bc327c2f370d6f3a83a840a2af97e9386e17b78f580fdddd59e
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: bb21dacf0ed5c64b239b6ef9ad09eee9
SHA-256: 28f8326ac1fdf67331cc918cc80dc7e95d72c44b3bd0560fef8e6c587e6f05d3
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 47e3af8df6c92f3ef1a6ee51dc99d463
SHA-256: 9b8c0966b05fb1fa7d0d3c9fd1ef8eb6715603939bd496517dfe90c9a4c2f688
java-1.6.0-sun-plugin-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: f546b20a9506b1cadc999e4cff780bac
SHA-256: f3a6de3433d8376f4e486fe1c4f8885be61b85fce1c35cdc36a4bdf6377114e7
java-1.6.0-sun-src-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 614a0f979dc8c168a2f604488a0fa51c
SHA-256: 155e1a57846a8cfeb81838d65f2e70915fe44b8678a40d992759d1e3677ff8cb
 
x86_64:
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: 1732cdc32a17af9f73290c8259acb981
SHA-256: 9b55b461e9bdd18240fd6e1997880f7a95acd16a369bf05036b270399f7d6d7d
java-1.6.0-sun-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 380c6422747d656245dd90bf09e8034b
SHA-256: 001434d1ee215ca6e9ca910764be66f41357d4e6d471e84b29bd8bf0f0c36cc4
java-1.6.0-sun-demo-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 301faa82d283709a575ff0df6c8aec80
SHA-256: 621cc283a271f43ef42edca50fda817359444c3191042de77785d064369e1ea3
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.i686.rpm
File outdated by:  RHSA-2013:0758
    MD5: bb21dacf0ed5c64b239b6ef9ad09eee9
SHA-256: 28f8326ac1fdf67331cc918cc80dc7e95d72c44b3bd0560fef8e6c587e6f05d3
java-1.6.0-sun-devel-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: d67bd57dca7090eba5af6eadcfcbdbf2
SHA-256: 040d144def66f00efd61830dcc43e3345421b77bb5b1d60ec8df9d0a88bfe8b3
java-1.6.0-sun-jdbc-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 2b87608ab11b8d0fbe0e5765be9f419f
SHA-256: 0b1ac3e6794430ba3748c57252f74dcf6f0dda037a0063c689976b7dc697dc81
java-1.6.0-sun-plugin-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 44021a6e3eb87ab8b3ac49736476ca99
SHA-256: 69703903f3e6bd6fd81765f0fbd2dc44e58af4d37115a1e4764ebc4bb353ae82
java-1.6.0-sun-src-1.6.0.39-1jpp.1.el6_3.x86_64.rpm
File outdated by:  RHSA-2013:0758
    MD5: 3ba266c32f95dcb539134e7f0f89051d
SHA-256: fda032db88c698a040428e07713dba71b070f4bdaf4a5e1f86f7080e2ed3f2be
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

859140 - CVE-2013-0440 OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)
860652 - CVE-2013-1475 OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)
906813 - CVE-2013-0424 OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)
906892 - CVE-2013-0435 OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)
906894 - CVE-2013-1478 OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)
906899 - CVE-2013-0442 OpenJDK: insufficient privilege checking issue (AWT, 7192977)
906900 - CVE-2013-0445 OpenJDK: insufficient privilege checking issue (AWT, 8001057)
906904 - CVE-2013-1480 OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)
906911 - CVE-2013-0450 OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)
906914 - CVE-2012-1541 Oracle JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)
906916 - CVE-2013-0446 Oracle JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)
906917 - CVE-2012-3342 Oracle JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)
906918 - CVE-2013-0419 Oracle JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)
906921 - CVE-2013-0423 Oracle JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)
906923 - CVE-2013-0351 Oracle JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)
906930 - CVE-2013-0430 Oracle JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Install)
906933 - CVE-2013-1473 Oracle JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)
906935 - CVE-2013-0438 Oracle JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)
907207 - CVE-2013-0428 OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)
907219 - CVE-2013-0432 OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)
907223 - CVE-2012-3213 Oracle JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)
907224 - CVE-2013-1481 Oracle JDK: unspecified vulnerability fixed in 6u39 (Sound)
907226 - CVE-2013-0409 Oracle JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)
907340 - CVE-2013-0443 OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)
907344 - CVE-2013-0425 OpenJDK: logging insufficient access control checks (Libraries, 6664509)
907346 - CVE-2013-0426 OpenJDK: logging insufficient access control checks (Libraries, 6664528)
907453 - CVE-2013-0434 OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)
907455 - CVE-2013-0427 OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)
907456 - CVE-2013-0433 OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)
907457 - CVE-2013-1476 OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)
907458 - CVE-2013-0441 OpenJDK: missing serialization restriction (CORBA, 7201066)
907460 - CVE-2013-0429 OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694)


References

https://www.redhat.com/security/data/cve/CVE-2012-1541.html
https://www.redhat.com/security/data/cve/CVE-2012-3213.html
https://www.redhat.com/security/data/cve/CVE-2012-3342.html
https://www.redhat.com/security/data/cve/CVE-2013-0351.html
https://www.redhat.com/security/data/cve/CVE-2013-0409.html
https://www.redhat.com/security/data/cve/CVE-2013-0419.html
https://www.redhat.com/security/data/cve/CVE-2013-0423.html
https://www.redhat.com/security/data/cve/CVE-2013-0424.html
https://www.redhat.com/security/data/cve/CVE-2013-0425.html
https://www.redhat.com/security/data/cve/CVE-2013-0426.html
https://www.redhat.com/security/data/cve/CVE-2013-0427.html
https://www.redhat.com/security/data/cve/CVE-2013-0428.html
https://www.redhat.com/security/data/cve/CVE-2013-0429.html
https://www.redhat.com/security/data/cve/CVE-2013-0430.html
https://www.redhat.com/security/data/cve/CVE-2013-0432.html
https://www.redhat.com/security/data/cve/CVE-2013-0433.html
https://www.redhat.com/security/data/cve/CVE-2013-0434.html
https://www.redhat.com/security/data/cve/CVE-2013-0435.html
https://www.redhat.com/security/data/cve/CVE-2013-0438.html
https://www.redhat.com/security/data/cve/CVE-2013-0440.html
https://www.redhat.com/security/data/cve/CVE-2013-0441.html
https://www.redhat.com/security/data/cve/CVE-2013-0442.html
https://www.redhat.com/security/data/cve/CVE-2013-0443.html
https://www.redhat.com/security/data/cve/CVE-2013-0445.html
https://www.redhat.com/security/data/cve/CVE-2013-0446.html
https://www.redhat.com/security/data/cve/CVE-2013-0450.html
https://www.redhat.com/security/data/cve/CVE-2013-1473.html
https://www.redhat.com/security/data/cve/CVE-2013-1475.html
https://www.redhat.com/security/data/cve/CVE-2013-1476.html
https://www.redhat.com/security/data/cve/CVE-2013-1478.html
https://www.redhat.com/security/data/cve/CVE-2013-1480.html
https://www.redhat.com/security/data/cve/CVE-2013-1481.html
https://access.redhat.com/security/updates/classification/#critical
http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/