Skip to navigation

Security Advisory Critical: java-1.7.0-ibm security update

Advisory: RHSA-2013:1060-2
Type: Security Advisory
Severity: Critical
Issued on: 2013-07-15
Last updated on: 2013-07-15
Affected Products: RHEL Supplementary EUS (v. 5.9.z server)
RHEL Supplementary Long Life (v. 5.9 server)
Red Hat Enterprise Linux Desktop Supplementary (v. 6)
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary AUS (v. 6.4)
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.4.z)
Red Hat Enterprise Linux Workstation Supplementary (v. 6)
CVEs (cve.mitre.org): CVE-2013-1500
CVE-2013-1571
CVE-2013-2400
CVE-2013-2407
CVE-2013-2412
CVE-2013-2437
CVE-2013-2442
CVE-2013-2444
CVE-2013-2446
CVE-2013-2447
CVE-2013-2448
CVE-2013-2449
CVE-2013-2450
CVE-2013-2451
CVE-2013-2452
CVE-2013-2453
CVE-2013-2454
CVE-2013-2455
CVE-2013-2456
CVE-2013-2457
CVE-2013-2458
CVE-2013-2459
CVE-2013-2460
CVE-2013-2462
CVE-2013-2463
CVE-2013-2464
CVE-2013-2465
CVE-2013-2466
CVE-2013-2468
CVE-2013-2469
CVE-2013-2470
CVE-2013-2471
CVE-2013-2472
CVE-2013-2473
CVE-2013-3006
CVE-2013-3007
CVE-2013-3008
CVE-2013-3009
CVE-2013-3010
CVE-2013-3011
CVE-2013-3012
CVE-2013-3744
CVE-2013-4002

Details

Updated java-1.7.0-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 5 and 6 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM
Java Software Development Kit.

This update fixes several vulnerabilities in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Detailed
vulnerability descriptions are linked from the IBM Security alerts page,
listed in the References section. (CVE-2013-1500, CVE-2013-1571,
CVE-2013-2400, CVE-2013-2407, CVE-2013-2412, CVE-2013-2437, CVE-2013-2442,
CVE-2013-2444, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2449,
CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454,
CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2458, CVE-2013-2459,
CVE-2013-2460, CVE-2013-2462, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465,
CVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471,
CVE-2013-2472, CVE-2013-2473, CVE-2013-3744)

Red Hat would like to thank Tim Brown for reporting CVE-2013-1500, and
US-CERT for reporting CVE-2013-1571. US-CERT acknowledges Oracle as the
original reporter of CVE-2013-1571.

All users of java-1.7.0-ibm are advised to upgrade to these updated
packages, containing the IBM Java SE 7 SR5 release. All running
instances of IBM Java must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Supplementary EUS (v. 5.9.z server)

IA-32:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 4d4b3b092b95793501725c20ca2ac62c
SHA-256: a0bb1f77fd443059d02d2ea1722ff28d64e9d8c9fc07f23a2218ff8c5abbf9a1
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 1e748faa019130a3380f09f4af15e91a
SHA-256: 8786beb85cbd9059744589066a08662f86c561022b447c3d6de7fb1aab8b0576
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: e1156e8dcd653a9d54a7059024073495
SHA-256: b2af55634b5ab36cebb9b4128552e25fb94f222f0cb23057c73fa4f466ac9e61
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 97c935176ef0bbd30279acc5513aad6f
SHA-256: 86b2d02254c5ef59af75ed4276ab1457173618d639028c05dcd8d3d4dfb04430
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 096d32c26d2ad8a73d2d65bb2384f7c0
SHA-256: d8a01c709ccfa041c2af06432323ac0ed26528cf1408e675d4fea3d6acfb9f9f
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 6fc4dbb60e1f4533db27d941a4d531b3
SHA-256: 901bc47a9c672a5835be8c87e828560f8ef099c2298c2feb04afc3c998513852
 
PPC:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9.ppc.rpm     MD5: 3c9e0db3460d8d3ae3132bedbe6b68bf
SHA-256: e9811fbff23c2f00883eaf4b4a353f6cfdbb412b9068f15b85f9b9127bf25635
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9.ppc64.rpm     MD5: eac84799ab3bb83d2a09f1b2884b6a5a
SHA-256: 7727f32ea9dc8c4d895f569ddd80f7a4aa4240897b7ac6caa6001f9c13b7f31e
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9.ppc.rpm     MD5: 4fa2423e5876c7c0bdc2204984cbf854
SHA-256: 96125155ec9b342a12a9867d60d3eefd5b50a72b940d3c5644092095320cb9a5
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9.ppc64.rpm     MD5: 64d18971fa5ddede8f6f22e7110a6622
SHA-256: 9b3f3d838df33d44fa772e7cef9a9e8c0e0a9eb69f75632aabc3560008c81011
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9.ppc.rpm     MD5: f118288a80a401df6f1d8adb6a2b3aeb
SHA-256: dfc4dcbd8b86b6361cdc5093b90b023a69a34130629c1ac7d17f88c42863f93a
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9.ppc64.rpm     MD5: 5e43cc694ccedf7d78c118748cf939fa
SHA-256: f903232809649b46fc1fade45ae4c8fc1729e7937479c92b3dbe712cb61a339e
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9.ppc.rpm     MD5: 0ccc2cd0652864a2985695d7e8660775
SHA-256: f2800966532a8ca70d47fb329b4b0d7cb183c07258d441aea2bf48412dd3236f
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9.ppc64.rpm     MD5: 6202aab89abca1bc2c78b19bd587d036
SHA-256: dafaded704f94dfc97f8b7810cc80d8db64eb6b78783a0d3cf792cea2008069d
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el5_9.ppc.rpm     MD5: 1afae8a76fa4d5a1f07350f362cb2861
SHA-256: 54693a4e6408732f33a2cef3a73203bca29550775242a5735733432fa67c7b51
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9.ppc.rpm     MD5: 696628630b9bca8c51f91e797d0b3922
SHA-256: 660656384f39920a6630d3c036d30813370839181b79df3a2e5b8dd064ba34d4
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9.ppc64.rpm     MD5: cc9c01f9252e164a200ff4ac000f5ef5
SHA-256: 42645e61a9ce94ec9785077371a9cee756ea2d49b1e9a58dbc611dc89c243d8a
 
s390x:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9.s390.rpm     MD5: 696544f9b4f2be58e570a9a8c7cf25e5
SHA-256: c7b77fa202e9e12f075659b20eb7f6c12962a125ef5840e25e9d7961e3ecd962
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9.s390x.rpm     MD5: 93474457d39918f5ac4e967c02c7f9e3
SHA-256: 4919c27c33369725d6fc49cf81ade52598e680993ce20be4e5a76bea99f3397d
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9.s390.rpm     MD5: 1ee4891a48aaafc5bccdb39c4476741a
SHA-256: 6fcec375f8c651b167f0d0a1c41f74b05b086cb1cc4407a58dd05f3ccfffc520
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9.s390x.rpm     MD5: 3ba782b834fdfb7554051f1339660669
SHA-256: 387645e87694044afa4334cea06dfef293938032f1c458647a8c1d2b0683f8a3
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9.s390.rpm     MD5: 56e1d9ade82a89cedefec80c2984e110
SHA-256: b27af6ec76d815b6a0897b299bedb3176ccce1330db97fdb316f060e9dbe009c
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9.s390x.rpm     MD5: 0b7da7ca5fc334ae519e7eb3baa6e794
SHA-256: ad5d571c85ae01304263dff247d0504d284dc00ad37c3efc91037c81230bc195
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9.s390.rpm     MD5: 6dc8de59f1ff0d9674ab1c07e6a98ad1
SHA-256: 64b14c6ab977854f16e7666d0cafe30faad7056423a187bddbff80030537510d
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9.s390x.rpm     MD5: bb0decc23badc6d6b59fdcfd0be30575
SHA-256: 8daa8733aa68d0abe721053dc9e1159a0a2376abab4ebce0af8aafaacd4c2923
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9.s390.rpm     MD5: 833907d84ccf84d039f689a780869ce8
SHA-256: 234e0dfd64ab5cfcf79440df2e638f9b1c4bafc7f507506ce9fecc444203e7f8
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9.s390x.rpm     MD5: e86285b8ef6eaeabdddedd38f7998d8c
SHA-256: ee700781b4d79368e2a62402eadb054a539056c5e69ae30e8c670094ffa8b841
 
x86_64:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 4d4b3b092b95793501725c20ca2ac62c
SHA-256: a0bb1f77fd443059d02d2ea1722ff28d64e9d8c9fc07f23a2218ff8c5abbf9a1
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: 03c506c7970170f45f79b5dccd0d1e0e
SHA-256: 96a43a012c5f1f1c4c0b9c0dbd93af948fef063a995b0d1f05a312fe4fb4d196
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 1e748faa019130a3380f09f4af15e91a
SHA-256: 8786beb85cbd9059744589066a08662f86c561022b447c3d6de7fb1aab8b0576
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: b5d70aa06349a425485561f6115a4c3b
SHA-256: 070a08aadd0da948da239b6c1e522b569bfcf8fad178c2c35184e6ac5cc1f1d7
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: e1156e8dcd653a9d54a7059024073495
SHA-256: b2af55634b5ab36cebb9b4128552e25fb94f222f0cb23057c73fa4f466ac9e61
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: 2f134d81c4e321e2d8b6a2584e01d81b
SHA-256: f5f4382181cfc82b57086c6cf3ebf3cffeb5e082c416b7a093df29e5ef46b927
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 97c935176ef0bbd30279acc5513aad6f
SHA-256: 86b2d02254c5ef59af75ed4276ab1457173618d639028c05dcd8d3d4dfb04430
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: 12d34ba254e2ad14aef586f8db49cf41
SHA-256: e2d0630cb66852d4fea17f54f8d19188711c92f2928316e058390d52a8b9e057
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 096d32c26d2ad8a73d2d65bb2384f7c0
SHA-256: d8a01c709ccfa041c2af06432323ac0ed26528cf1408e675d4fea3d6acfb9f9f
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: 50efe6b0fdac807a5b589c5fc6d92799
SHA-256: 86f34f8695677417bc11132b66f5b6099c598b2dd2e20776895f950949badc86
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 6fc4dbb60e1f4533db27d941a4d531b3
SHA-256: 901bc47a9c672a5835be8c87e828560f8ef099c2298c2feb04afc3c998513852
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: 8f43da4e8ae22c12c9788da8fe3e8d7b
SHA-256: ce669d6cdbe3d8b2b38eba0f27768ec9e874f35531d823ab0f6c4590d07c7dd2
 
RHEL Supplementary Long Life (v. 5.9 server)

IA-32:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 4d4b3b092b95793501725c20ca2ac62c
SHA-256: a0bb1f77fd443059d02d2ea1722ff28d64e9d8c9fc07f23a2218ff8c5abbf9a1
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 1e748faa019130a3380f09f4af15e91a
SHA-256: 8786beb85cbd9059744589066a08662f86c561022b447c3d6de7fb1aab8b0576
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: e1156e8dcd653a9d54a7059024073495
SHA-256: b2af55634b5ab36cebb9b4128552e25fb94f222f0cb23057c73fa4f466ac9e61
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 97c935176ef0bbd30279acc5513aad6f
SHA-256: 86b2d02254c5ef59af75ed4276ab1457173618d639028c05dcd8d3d4dfb04430
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 096d32c26d2ad8a73d2d65bb2384f7c0
SHA-256: d8a01c709ccfa041c2af06432323ac0ed26528cf1408e675d4fea3d6acfb9f9f
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 6fc4dbb60e1f4533db27d941a4d531b3
SHA-256: 901bc47a9c672a5835be8c87e828560f8ef099c2298c2feb04afc3c998513852
 
x86_64:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 4d4b3b092b95793501725c20ca2ac62c
SHA-256: a0bb1f77fd443059d02d2ea1722ff28d64e9d8c9fc07f23a2218ff8c5abbf9a1
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: 03c506c7970170f45f79b5dccd0d1e0e
SHA-256: 96a43a012c5f1f1c4c0b9c0dbd93af948fef063a995b0d1f05a312fe4fb4d196
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 1e748faa019130a3380f09f4af15e91a
SHA-256: 8786beb85cbd9059744589066a08662f86c561022b447c3d6de7fb1aab8b0576
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: b5d70aa06349a425485561f6115a4c3b
SHA-256: 070a08aadd0da948da239b6c1e522b569bfcf8fad178c2c35184e6ac5cc1f1d7
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: e1156e8dcd653a9d54a7059024073495
SHA-256: b2af55634b5ab36cebb9b4128552e25fb94f222f0cb23057c73fa4f466ac9e61
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: 2f134d81c4e321e2d8b6a2584e01d81b
SHA-256: f5f4382181cfc82b57086c6cf3ebf3cffeb5e082c416b7a093df29e5ef46b927
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 97c935176ef0bbd30279acc5513aad6f
SHA-256: 86b2d02254c5ef59af75ed4276ab1457173618d639028c05dcd8d3d4dfb04430
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: 12d34ba254e2ad14aef586f8db49cf41
SHA-256: e2d0630cb66852d4fea17f54f8d19188711c92f2928316e058390d52a8b9e057
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 096d32c26d2ad8a73d2d65bb2384f7c0
SHA-256: d8a01c709ccfa041c2af06432323ac0ed26528cf1408e675d4fea3d6acfb9f9f
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: 50efe6b0fdac807a5b589c5fc6d92799
SHA-256: 86f34f8695677417bc11132b66f5b6099c598b2dd2e20776895f950949badc86
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9.i386.rpm     MD5: 6fc4dbb60e1f4533db27d941a4d531b3
SHA-256: 901bc47a9c672a5835be8c87e828560f8ef099c2298c2feb04afc3c998513852
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9.x86_64.rpm     MD5: 8f43da4e8ae22c12c9788da8fe3e8d7b
SHA-256: ce669d6cdbe3d8b2b38eba0f27768ec9e874f35531d823ab0f6c4590d07c7dd2
 
Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0c7a18d3557d0f3fcd0d5a88b4dc1421
SHA-256: 0dc003302b932271b48f5e2e5a6c96f9b729bfc1fbc15c535a7a887bc7c725bd
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 2143e10158444669f32b8d9ce69c89f4
SHA-256: 178343a74e788eb9cac6a28367da6454d2a34c4fd45657f116c0e3bfb0a741da
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: bbdbdffd45c72140f73b9cda9b078e58
SHA-256: 8a825527b265a1f42520f561449de7685d9ba56c1f709f3c680b82fbe1c511df
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0e5e55f748da69de11029397317dc134
SHA-256: 457c542b2073882910ba6baee48b5902b0636d784b304ba8264da0a64f5eadb9
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 9455917a86bdc3a34082a3bbe2231451
SHA-256: cf222f72aa15c6e65dd5e5842bce5690f789aea9a97f4b846d8428a3a175266f
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 7371c8e089a0f874842a6e6133052085
SHA-256: 3b2444a47b232e9b959448faf692211ed86821ed23fc0b7813fd1b4146e13f6a
 
x86_64:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: d4642154d4b75b811ce4b650c4a8328a
SHA-256: 2c82b73288f746a5d854c1d606607f3b6f67f2b05c8fd822e7d97e07d189fa22
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 8da59030725cf57e4065821c546d5b05
SHA-256: 7f0b42e74c109bab6b1fc3356a4fddf04998a5f6f47fffaf1c72e372c05d0ae0
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 7d773fdf9081509ff5df09d81f6819da
SHA-256: f7c6bfd68a0138aa36f6796da0c6523c6ea35d0a7c8d534e5589f7d5f8dc44b2
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 072f44d58a28d658d7de24e6e9990343
SHA-256: 6e11ddec72334d73d2464165135660e3c058be619b38a2f817528467cc503e25
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 88ee7ec98d10ce92546151ca8bb3112a
SHA-256: 8d4313814d3d905eafaf3cb8ef64ea37ca4f8242eb3582959379b51df2d5ee64
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 8558f1dc8db6997286dbb78ce8303513
SHA-256: f87726abf8b7876bd770f7ad35e25afe966ad8e3db7bb06ac5f8c36005271edc
 
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)

x86_64:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: d4642154d4b75b811ce4b650c4a8328a
SHA-256: 2c82b73288f746a5d854c1d606607f3b6f67f2b05c8fd822e7d97e07d189fa22
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 8da59030725cf57e4065821c546d5b05
SHA-256: 7f0b42e74c109bab6b1fc3356a4fddf04998a5f6f47fffaf1c72e372c05d0ae0
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 7d773fdf9081509ff5df09d81f6819da
SHA-256: f7c6bfd68a0138aa36f6796da0c6523c6ea35d0a7c8d534e5589f7d5f8dc44b2
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 8558f1dc8db6997286dbb78ce8303513
SHA-256: f87726abf8b7876bd770f7ad35e25afe966ad8e3db7bb06ac5f8c36005271edc
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0c7a18d3557d0f3fcd0d5a88b4dc1421
SHA-256: 0dc003302b932271b48f5e2e5a6c96f9b729bfc1fbc15c535a7a887bc7c725bd
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 2143e10158444669f32b8d9ce69c89f4
SHA-256: 178343a74e788eb9cac6a28367da6454d2a34c4fd45657f116c0e3bfb0a741da
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: bbdbdffd45c72140f73b9cda9b078e58
SHA-256: 8a825527b265a1f42520f561449de7685d9ba56c1f709f3c680b82fbe1c511df
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0e5e55f748da69de11029397317dc134
SHA-256: 457c542b2073882910ba6baee48b5902b0636d784b304ba8264da0a64f5eadb9
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 9455917a86bdc3a34082a3bbe2231451
SHA-256: cf222f72aa15c6e65dd5e5842bce5690f789aea9a97f4b846d8428a3a175266f
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 7371c8e089a0f874842a6e6133052085
SHA-256: 3b2444a47b232e9b959448faf692211ed86821ed23fc0b7813fd1b4146e13f6a
 
PPC:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 917553c6e85a65cfaa8c793da1172ca6
SHA-256: 59cf2cc9ab96bbe85b535902ed5ecf0bb64e3a9740e3d3cef0febccf4b5431a3
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 2b04397e9cabb48d296914fe34c5f040
SHA-256: 56d23285f8e3696d0b31a55127546b0891281f1a0d63e7fac4e92c583477510c
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: b4abb9b4c54ba977b2f2c5f8b403981a
SHA-256: a1545e20c9a13a845374c623cb307d0387555fea86e990213bd19d620e918614
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: bac7d3a71ebb2f0fefe2f936672c438f
SHA-256: 197947335f895830148006d88ed23fa07aae84988b34add684ca3b80f0d7947e
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.ppc64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 2547d90e2904ec6dec7096d0f6801ac1
SHA-256: 462fa6b941896cf041c7631d5296ea1fc98c0ca914fa1b18854638f40469383e
 
s390x:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 374b86d83ecd136f46ee31374f7c453a
SHA-256: 2e23491b09c2f351ce5e71041681a0ed10754b96ee7819aa3953fd14d1ab7418
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0187c533d73fd11cf1bde63b90e94635
SHA-256: 6e9f9713ec45fb6d373d26f03134123914d3450a0e4a1366e46383542f6eadc8
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 14c8fbdff6fb0dcfbeb1593a95379580
SHA-256: 1b557d795a5e02331c45fbf4d38c0af7acca6c6032e6fa825a9f7d2ae7513ee4
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 7d23447551ad5e8070bc765311a88d71
SHA-256: e4bf18e4ae2e1eb3df7bb33e568cf96dad89fd7e5cb2215d7f5927d2be2369a6
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.s390x.rpm
File outdated by:  RHSA-2014:0134
    MD5: 03955b02c3567815d05bd4c975665d9e
SHA-256: e400edb30351847a387469c9d63688cee7b4414c61a85ea58c4b42897691fe39
 
x86_64:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: d4642154d4b75b811ce4b650c4a8328a
SHA-256: 2c82b73288f746a5d854c1d606607f3b6f67f2b05c8fd822e7d97e07d189fa22
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 8da59030725cf57e4065821c546d5b05
SHA-256: 7f0b42e74c109bab6b1fc3356a4fddf04998a5f6f47fffaf1c72e372c05d0ae0
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 7d773fdf9081509ff5df09d81f6819da
SHA-256: f7c6bfd68a0138aa36f6796da0c6523c6ea35d0a7c8d534e5589f7d5f8dc44b2
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 072f44d58a28d658d7de24e6e9990343
SHA-256: 6e11ddec72334d73d2464165135660e3c058be619b38a2f817528467cc503e25
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 88ee7ec98d10ce92546151ca8bb3112a
SHA-256: 8d4313814d3d905eafaf3cb8ef64ea37ca4f8242eb3582959379b51df2d5ee64
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 8558f1dc8db6997286dbb78ce8303513
SHA-256: f87726abf8b7876bd770f7ad35e25afe966ad8e3db7bb06ac5f8c36005271edc
 
Red Hat Enterprise Linux Server Supplementary AUS (v. 6.4)

x86_64:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: d4642154d4b75b811ce4b650c4a8328a
SHA-256: 2c82b73288f746a5d854c1d606607f3b6f67f2b05c8fd822e7d97e07d189fa22
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 8da59030725cf57e4065821c546d5b05
SHA-256: 7f0b42e74c109bab6b1fc3356a4fddf04998a5f6f47fffaf1c72e372c05d0ae0
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 7d773fdf9081509ff5df09d81f6819da
SHA-256: f7c6bfd68a0138aa36f6796da0c6523c6ea35d0a7c8d534e5589f7d5f8dc44b2
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 072f44d58a28d658d7de24e6e9990343
SHA-256: 6e11ddec72334d73d2464165135660e3c058be619b38a2f817528467cc503e25
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 88ee7ec98d10ce92546151ca8bb3112a
SHA-256: 8d4313814d3d905eafaf3cb8ef64ea37ca4f8242eb3582959379b51df2d5ee64
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 8558f1dc8db6997286dbb78ce8303513
SHA-256: f87726abf8b7876bd770f7ad35e25afe966ad8e3db7bb06ac5f8c36005271edc
 
Red Hat Enterprise Linux Server Supplementary EUS (v. 6.4.z)

IA-32:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2013:1507
    MD5: 0c7a18d3557d0f3fcd0d5a88b4dc1421
SHA-256: 0dc003302b932271b48f5e2e5a6c96f9b729bfc1fbc15c535a7a887bc7c725bd
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2013:1507
    MD5: 2143e10158444669f32b8d9ce69c89f4
SHA-256: 178343a74e788eb9cac6a28367da6454d2a34c4fd45657f116c0e3bfb0a741da
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2013:1507
    MD5: bbdbdffd45c72140f73b9cda9b078e58
SHA-256: 8a825527b265a1f42520f561449de7685d9ba56c1f709f3c680b82fbe1c511df
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2013:1507
    MD5: 0e5e55f748da69de11029397317dc134
SHA-256: 457c542b2073882910ba6baee48b5902b0636d784b304ba8264da0a64f5eadb9
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2013:1507
    MD5: 9455917a86bdc3a34082a3bbe2231451
SHA-256: cf222f72aa15c6e65dd5e5842bce5690f789aea9a97f4b846d8428a3a175266f
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2013:1507
    MD5: 7371c8e089a0f874842a6e6133052085
SHA-256: 3b2444a47b232e9b959448faf692211ed86821ed23fc0b7813fd1b4146e13f6a
 
PPC:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.ppc64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 917553c6e85a65cfaa8c793da1172ca6
SHA-256: 59cf2cc9ab96bbe85b535902ed5ecf0bb64e3a9740e3d3cef0febccf4b5431a3
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.ppc64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 2b04397e9cabb48d296914fe34c5f040
SHA-256: 56d23285f8e3696d0b31a55127546b0891281f1a0d63e7fac4e92c583477510c
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.ppc64.rpm
File outdated by:  RHSA-2013:1507
    MD5: b4abb9b4c54ba977b2f2c5f8b403981a
SHA-256: a1545e20c9a13a845374c623cb307d0387555fea86e990213bd19d620e918614
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.ppc64.rpm
File outdated by:  RHSA-2013:1507
    MD5: bac7d3a71ebb2f0fefe2f936672c438f
SHA-256: 197947335f895830148006d88ed23fa07aae84988b34add684ca3b80f0d7947e
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.ppc64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 2547d90e2904ec6dec7096d0f6801ac1
SHA-256: 462fa6b941896cf041c7631d5296ea1fc98c0ca914fa1b18854638f40469383e
 
s390x:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.s390x.rpm
File outdated by:  RHSA-2013:1507
    MD5: 374b86d83ecd136f46ee31374f7c453a
SHA-256: 2e23491b09c2f351ce5e71041681a0ed10754b96ee7819aa3953fd14d1ab7418
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.s390x.rpm
File outdated by:  RHSA-2013:1507
    MD5: 0187c533d73fd11cf1bde63b90e94635
SHA-256: 6e9f9713ec45fb6d373d26f03134123914d3450a0e4a1366e46383542f6eadc8
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.s390x.rpm
File outdated by:  RHSA-2013:1507
    MD5: 14c8fbdff6fb0dcfbeb1593a95379580
SHA-256: 1b557d795a5e02331c45fbf4d38c0af7acca6c6032e6fa825a9f7d2ae7513ee4
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.s390x.rpm
File outdated by:  RHSA-2013:1507
    MD5: 7d23447551ad5e8070bc765311a88d71
SHA-256: e4bf18e4ae2e1eb3df7bb33e568cf96dad89fd7e5cb2215d7f5927d2be2369a6
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.s390x.rpm
File outdated by:  RHSA-2013:1507
    MD5: 03955b02c3567815d05bd4c975665d9e
SHA-256: e400edb30351847a387469c9d63688cee7b4414c61a85ea58c4b42897691fe39
 
x86_64:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: d4642154d4b75b811ce4b650c4a8328a
SHA-256: 2c82b73288f746a5d854c1d606607f3b6f67f2b05c8fd822e7d97e07d189fa22
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 8da59030725cf57e4065821c546d5b05
SHA-256: 7f0b42e74c109bab6b1fc3356a4fddf04998a5f6f47fffaf1c72e372c05d0ae0
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 7d773fdf9081509ff5df09d81f6819da
SHA-256: f7c6bfd68a0138aa36f6796da0c6523c6ea35d0a7c8d534e5589f7d5f8dc44b2
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 072f44d58a28d658d7de24e6e9990343
SHA-256: 6e11ddec72334d73d2464165135660e3c058be619b38a2f817528467cc503e25
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 88ee7ec98d10ce92546151ca8bb3112a
SHA-256: 8d4313814d3d905eafaf3cb8ef64ea37ca4f8242eb3582959379b51df2d5ee64
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2013:1507
    MD5: 8558f1dc8db6997286dbb78ce8303513
SHA-256: f87726abf8b7876bd770f7ad35e25afe966ad8e3db7bb06ac5f8c36005271edc
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0c7a18d3557d0f3fcd0d5a88b4dc1421
SHA-256: 0dc003302b932271b48f5e2e5a6c96f9b729bfc1fbc15c535a7a887bc7c725bd
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 2143e10158444669f32b8d9ce69c89f4
SHA-256: 178343a74e788eb9cac6a28367da6454d2a34c4fd45657f116c0e3bfb0a741da
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: bbdbdffd45c72140f73b9cda9b078e58
SHA-256: 8a825527b265a1f42520f561449de7685d9ba56c1f709f3c680b82fbe1c511df
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 0e5e55f748da69de11029397317dc134
SHA-256: 457c542b2073882910ba6baee48b5902b0636d784b304ba8264da0a64f5eadb9
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 9455917a86bdc3a34082a3bbe2231451
SHA-256: cf222f72aa15c6e65dd5e5842bce5690f789aea9a97f4b846d8428a3a175266f
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.i686.rpm
File outdated by:  RHSA-2014:0134
    MD5: 7371c8e089a0f874842a6e6133052085
SHA-256: 3b2444a47b232e9b959448faf692211ed86821ed23fc0b7813fd1b4146e13f6a
 
x86_64:
java-1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: d4642154d4b75b811ce4b650c4a8328a
SHA-256: 2c82b73288f746a5d854c1d606607f3b6f67f2b05c8fd822e7d97e07d189fa22
java-1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 8da59030725cf57e4065821c546d5b05
SHA-256: 7f0b42e74c109bab6b1fc3356a4fddf04998a5f6f47fffaf1c72e372c05d0ae0
java-1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 7d773fdf9081509ff5df09d81f6819da
SHA-256: f7c6bfd68a0138aa36f6796da0c6523c6ea35d0a7c8d534e5589f7d5f8dc44b2
java-1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 072f44d58a28d658d7de24e6e9990343
SHA-256: 6e11ddec72334d73d2464165135660e3c058be619b38a2f817528467cc503e25
java-1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 88ee7ec98d10ce92546151ca8bb3112a
SHA-256: 8d4313814d3d905eafaf3cb8ef64ea37ca4f8242eb3582959379b51df2d5ee64
java-1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0134
    MD5: 8558f1dc8db6997286dbb78ce8303513
SHA-256: f87726abf8b7876bd770f7ad35e25afe966ad8e3db7bb06ac5f8c36005271edc
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

973474 - CVE-2013-1571 OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)
975099 - CVE-2013-2470 OpenJDK: ImagingLib byte lookup processing (2D, 8011243)
975102 - CVE-2013-2471 OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)
975107 - CVE-2013-2472 OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)
975110 - CVE-2013-2473 OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)
975115 - CVE-2013-2463 OpenJDK: Incorrect image attribute verification (2D, 8012438)
975118 - CVE-2013-2465 OpenJDK: Incorrect image channel verification (2D, 8012597)
975120 - CVE-2013-2469 OpenJDK: Incorrect image layout verification (2D, 8012601)
975121 - CVE-2013-2459 OpenJDK: Various AWT integer overflow checks (AWT, 8009071)
975122 - CVE-2013-2460 OpenJDK: tracing insufficient access checks (Serviceability, 8010209)
975125 - CVE-2013-2448 OpenJDK: Better access restrictions (Sound, 8006328)
975127 - CVE-2013-2407 OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)
975129 - CVE-2013-2454 OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)
975130 - CVE-2013-2458 OpenJDK: Method handles (Libraries, 8009424)
975131 - CVE-2013-2444 OpenJDK: Resource denial of service (AWT, 8001038)
975132 - CVE-2013-2446 OpenJDK: output stream access restrictions (CORBA, 8000642)
975133 - CVE-2013-2457 OpenJDK: Proper class checking (JMX, 8008120)
975134 - CVE-2013-2453 OpenJDK: MBeanServer Introspector package access (JMX, 8008124)
975138 - CVE-2013-2452 OpenJDK: Unique VMIDs (Libraries, 8001033)
975139 - CVE-2013-2455 OpenJDK: getEnclosing* checks (Libraries, 8007812)
975140 - CVE-2013-2447 OpenJDK: Prevent revealing the local address (Networking, 8001318)
975141 - CVE-2013-2450 OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)
975142 - CVE-2013-2456 OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)
975144 - CVE-2013-2412 OpenJDK: JConsole SSL support (Serviceability, 8003703)
975145 - CVE-2013-2449 OpenJDK: GnomeFileTypeDetector path access check (Libraries, 8004288)
975146 - CVE-2013-2451 OpenJDK: exclusive port binding (Networking, 7170730)
975148 - CVE-2013-1500 OpenJDK: Insecure shared memory permissions (2D, 8001034)
975757 - CVE-2013-2464 Oracle JDK: unspecified vulnerability fixed in 7u25 (2D)
975761 - CVE-2013-2468 Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment)
975764 - CVE-2013-2466 Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment)
975769 - CVE-2013-2462 Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment)
975770 - CVE-2013-2442 Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment)
975773 - CVE-2013-2437 Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment)
975774 - CVE-2013-2400 Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment)
975775 - CVE-2013-3744 Oracle JDK: unspecified vulnerability fixed in 7u25 (Deployment)


References

https://www.redhat.com/security/data/cve/CVE-2013-1500.html
https://www.redhat.com/security/data/cve/CVE-2013-1571.html
https://www.redhat.com/security/data/cve/CVE-2013-2400.html
https://www.redhat.com/security/data/cve/CVE-2013-2407.html
https://www.redhat.com/security/data/cve/CVE-2013-2412.html
https://www.redhat.com/security/data/cve/CVE-2013-2437.html
https://www.redhat.com/security/data/cve/CVE-2013-2442.html
https://www.redhat.com/security/data/cve/CVE-2013-2444.html
https://www.redhat.com/security/data/cve/CVE-2013-2446.html
https://www.redhat.com/security/data/cve/CVE-2013-2447.html
https://www.redhat.com/security/data/cve/CVE-2013-2448.html
https://www.redhat.com/security/data/cve/CVE-2013-2449.html
https://www.redhat.com/security/data/cve/CVE-2013-2450.html
https://www.redhat.com/security/data/cve/CVE-2013-2451.html
https://www.redhat.com/security/data/cve/CVE-2013-2452.html
https://www.redhat.com/security/data/cve/CVE-2013-2453.html
https://www.redhat.com/security/data/cve/CVE-2013-2454.html
https://www.redhat.com/security/data/cve/CVE-2013-2455.html
https://www.redhat.com/security/data/cve/CVE-2013-2456.html
https://www.redhat.com/security/data/cve/CVE-2013-2457.html
https://www.redhat.com/security/data/cve/CVE-2013-2458.html
https://www.redhat.com/security/data/cve/CVE-2013-2459.html
https://www.redhat.com/security/data/cve/CVE-2013-2460.html
https://www.redhat.com/security/data/cve/CVE-2013-2462.html
https://www.redhat.com/security/data/cve/CVE-2013-2463.html
https://www.redhat.com/security/data/cve/CVE-2013-2464.html
https://www.redhat.com/security/data/cve/CVE-2013-2465.html
https://www.redhat.com/security/data/cve/CVE-2013-2466.html
https://www.redhat.com/security/data/cve/CVE-2013-2468.html
https://www.redhat.com/security/data/cve/CVE-2013-2469.html
https://www.redhat.com/security/data/cve/CVE-2013-2470.html
https://www.redhat.com/security/data/cve/CVE-2013-2471.html
https://www.redhat.com/security/data/cve/CVE-2013-2472.html
https://www.redhat.com/security/data/cve/CVE-2013-2473.html
https://www.redhat.com/security/data/cve/CVE-2013-3006.html
https://www.redhat.com/security/data/cve/CVE-2013-3007.html
https://www.redhat.com/security/data/cve/CVE-2013-3008.html
https://www.redhat.com/security/data/cve/CVE-2013-3009.html
https://www.redhat.com/security/data/cve/CVE-2013-3010.html
https://www.redhat.com/security/data/cve/CVE-2013-3011.html
https://www.redhat.com/security/data/cve/CVE-2013-3012.html
https://www.redhat.com/security/data/cve/CVE-2013-3744.html
https://www.redhat.com/security/data/cve/CVE-2013-4002.html
https://access.redhat.com/security/updates/classification/#critical
https://www.ibm.com/developerworks/java/jdk/alerts/


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/