Security Advisory Low: Red Hat Network Satellite server IBM Java Runtime security update

Advisory: RHSA-2014:0982-1
Type: Security Advisory
Severity: Low
Issued on: 2014-07-29
Last updated on: 2014-07-29
Affected Products: Red Hat Network Satellite (v. 5.4 for RHEL 5)
Red Hat Network Satellite (v. 5.4 for RHEL 6)
Red Hat Network Satellite (v. 5.5 for RHEL 5)
Red Hat Network Satellite (v. 5.5 for RHEL 6)
Red Hat Satellite (v. 5.6 for RHEL 5)
Red Hat Satellite (v. 5.6 for RHEL 6)
CVEs (cve.mitre.org): CVE-2013-5878
CVE-2013-5884
CVE-2013-5887
CVE-2013-5888
CVE-2013-5889
CVE-2013-5896
CVE-2013-5898
CVE-2013-5899
CVE-2013-5907
CVE-2013-5910
CVE-2013-6629
CVE-2013-6954
CVE-2014-0368
CVE-2014-0373
CVE-2014-0375
CVE-2014-0376
CVE-2014-0387
CVE-2014-0403
CVE-2014-0410
CVE-2014-0411
CVE-2014-0415
CVE-2014-0416
CVE-2014-0417
CVE-2014-0422
CVE-2014-0423
CVE-2014-0424
CVE-2014-0428
CVE-2014-0429
CVE-2014-0446
CVE-2014-0449
CVE-2014-0451
CVE-2014-0452
CVE-2014-0453
CVE-2014-0457
CVE-2014-0458
CVE-2014-0460
CVE-2014-0461
CVE-2014-0878
CVE-2014-1876
CVE-2014-2398
CVE-2014-2401
CVE-2014-2409
CVE-2014-2412
CVE-2014-2414
CVE-2014-2420
CVE-2014-2421
CVE-2014-2423
CVE-2014-2427
CVE-2014-2428

Details

Updated java-1.6.0-ibm packages that fix several security issues are now
available for Red Hat Network Satellite Server 5.4, 5.5, and 5.6.

The Red Hat Security Response Team has rated this update as having Low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

This update corrects several security vulnerabilities in the IBM Java
Runtime Environment shipped as part of Red Hat Network Satellite Server
5.4, 5.5, and 5.6. In a typical operating environment, these are of low
security risk as the runtime is not used on untrusted applets.

Several flaws were fixed in the IBM Java 2 Runtime Environment.
(CVE-2013-5878, CVE-2013-5884, CVE-2013-5887, CVE-2013-5888, CVE-2013-5889,
CVE-2013-5896, CVE-2013-5898, CVE-2013-5899, CVE-2013-5907, CVE-2013-5910,
CVE-2013-6629, CVE-2013-6954, CVE-2014-0368, CVE-2014-0373, CVE-2014-0375,
CVE-2014-0376, CVE-2014-0387, CVE-2014-0403, CVE-2014-0410, CVE-2014-0411,
CVE-2014-0415, CVE-2014-0416, CVE-2014-0417, CVE-2014-0422, CVE-2014-0423,
CVE-2014-0424, CVE-2014-0428, CVE-2014-0429, CVE-2014-0446, CVE-2014-0449,
CVE-2014-0451, CVE-2014-0452, CVE-2014-0453, CVE-2014-0457, CVE-2014-0458,
CVE-2014-0460, CVE-2014-0461, CVE-2014-0878, CVE-2014-1876, CVE-2014-2398,
CVE-2014-2401, CVE-2014-2409, CVE-2014-2412, CVE-2014-2414, CVE-2014-2420,
CVE-2014-2421, CVE-2014-2423, CVE-2014-2427, CVE-2014-2428)

Users of Red Hat Network Satellite Server 5.4, 5.5, and 5.6 are advised to
upgrade to these updated packages, which contain the IBM Java SE 6 SR16
release. For this update to take effect, Red Hat Network Satellite Server
must be restarted ("/usr/sbin/rhn-satellite restart"), as well as all
running instances of IBM Java.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Updated packages

Red Hat Network Satellite (v. 5.4 for RHEL 5)

SRPMS:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el5.src.rpm
File outdated by:  RHSA-2015:1091
    MD5: b835a4256fb0314b472feab190834cfd
SHA-256: 926db0c78b5ed4da84344f0226eafff27ab6c5b5a6ef79c3478eabb3c5d2b08c
 
IA-32:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el5.i386.rpm     MD5: dc97d41b8878131ade63bb277666c575
SHA-256: 1116220f4bb1356f10a084d569f8160f2a4c99c17722d90db3caa495cbeaafc4
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el5.i386.rpm     MD5: b84b7f17ea40aa5e465ba561a2a729b0
SHA-256: 413dbde9e2c88140d2600400ffb1c2b274de07b93eba6693d4d6ab2987356e1e
 
s390x:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el5.s390x.rpm     MD5: e06f4ec0ae52981db6c87491a46dbf39
SHA-256: 53b395c0a47b7c9e55ff340968416c90010821dee332077d36b0bba05098dc51
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el5.s390x.rpm     MD5: a27fc99617e9de2376257aab80525bce
SHA-256: b968f97256e1929a14d55f8de549e2ddb07feac0c6e53fdefca70b4d45d7f909
 
x86_64:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el5.x86_64.rpm     MD5: 38c1ec49221d30a29a36260c5b8a8943
SHA-256: 50aa8aaf0af7a0606cb6ca2d0fc3f40e91ef130acc60b947762b4f8527ca79a9
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el5.x86_64.rpm     MD5: 83eeb59345281b1c1a981e1a36824678
SHA-256: 4cbf61b4f2425f6512ab3249c151cb116a95ffd839d2fbe26bed03673477bc66
 
Red Hat Network Satellite (v. 5.4 for RHEL 6)

SRPMS:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el6.src.rpm
File outdated by:  RHSA-2015:1091
    MD5: f74da299ca95c81ffdb6fcbb19ec12aa
SHA-256: 0ff0e759826778b16458a96511dbfa4538182bc07a74872d40c55c8e7b54afc8
 
s390x:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el6.s390x.rpm     MD5: e905c24aa9492eb15fd37d6be2f267dd
SHA-256: 986b0a3020ea25fe70968a7de9ab98460eae1f6cdc3a6a11e14fb411868a0fc7
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el6.s390x.rpm     MD5: b486ecb68423edbeeaf3e91e1756c253
SHA-256: fe864143c1986dd7bd295a9653b4883fe934c8528dc24083f0b1415612e967fb
 
x86_64:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el6.x86_64.rpm     MD5: ba5eab150b0d72b42ba64a2937c3a1fe
SHA-256: d206b485af59a65ee4e376c42fc8a717ce39f2520b389200b289284949bc07cd
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el6.x86_64.rpm     MD5: ece417c6b96cb1eeeb3eeac5a2dd4f2a
SHA-256: 6bfb18e2d77af7cd6f00d6e16d23c41ba8f20a9e5883e4f8e62f4b7cef4064c0
 
Red Hat Network Satellite (v. 5.5 for RHEL 5)

SRPMS:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el5.src.rpm
File outdated by:  RHSA-2015:1091
    MD5: b835a4256fb0314b472feab190834cfd
SHA-256: 926db0c78b5ed4da84344f0226eafff27ab6c5b5a6ef79c3478eabb3c5d2b08c
 
s390x:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el5.s390x.rpm     MD5: e06f4ec0ae52981db6c87491a46dbf39
SHA-256: 53b395c0a47b7c9e55ff340968416c90010821dee332077d36b0bba05098dc51
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el5.s390x.rpm     MD5: a27fc99617e9de2376257aab80525bce
SHA-256: b968f97256e1929a14d55f8de549e2ddb07feac0c6e53fdefca70b4d45d7f909
 
x86_64:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el5.x86_64.rpm     MD5: 38c1ec49221d30a29a36260c5b8a8943
SHA-256: 50aa8aaf0af7a0606cb6ca2d0fc3f40e91ef130acc60b947762b4f8527ca79a9
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el5.x86_64.rpm     MD5: 83eeb59345281b1c1a981e1a36824678
SHA-256: 4cbf61b4f2425f6512ab3249c151cb116a95ffd839d2fbe26bed03673477bc66
 
Red Hat Network Satellite (v. 5.5 for RHEL 6)

SRPMS:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el6.src.rpm
File outdated by:  RHSA-2015:1091
    MD5: f74da299ca95c81ffdb6fcbb19ec12aa
SHA-256: 0ff0e759826778b16458a96511dbfa4538182bc07a74872d40c55c8e7b54afc8
 
s390x:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el6.s390x.rpm     MD5: e905c24aa9492eb15fd37d6be2f267dd
SHA-256: 986b0a3020ea25fe70968a7de9ab98460eae1f6cdc3a6a11e14fb411868a0fc7
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el6.s390x.rpm     MD5: b486ecb68423edbeeaf3e91e1756c253
SHA-256: fe864143c1986dd7bd295a9653b4883fe934c8528dc24083f0b1415612e967fb
 
x86_64:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el6.x86_64.rpm     MD5: ba5eab150b0d72b42ba64a2937c3a1fe
SHA-256: d206b485af59a65ee4e376c42fc8a717ce39f2520b389200b289284949bc07cd
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el6.x86_64.rpm     MD5: ece417c6b96cb1eeeb3eeac5a2dd4f2a
SHA-256: 6bfb18e2d77af7cd6f00d6e16d23c41ba8f20a9e5883e4f8e62f4b7cef4064c0
 
Red Hat Satellite (v. 5.6 for RHEL 5)

SRPMS:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el5.src.rpm
File outdated by:  RHSA-2015:1091
    MD5: b835a4256fb0314b472feab190834cfd
SHA-256: 926db0c78b5ed4da84344f0226eafff27ab6c5b5a6ef79c3478eabb3c5d2b08c
 
s390x:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1091
    MD5: e06f4ec0ae52981db6c87491a46dbf39
SHA-256: 53b395c0a47b7c9e55ff340968416c90010821dee332077d36b0bba05098dc51
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el5.s390x.rpm
File outdated by:  RHSA-2015:1091
    MD5: a27fc99617e9de2376257aab80525bce
SHA-256: b968f97256e1929a14d55f8de549e2ddb07feac0c6e53fdefca70b4d45d7f909
 
x86_64:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1091
    MD5: 38c1ec49221d30a29a36260c5b8a8943
SHA-256: 50aa8aaf0af7a0606cb6ca2d0fc3f40e91ef130acc60b947762b4f8527ca79a9
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el5.x86_64.rpm
File outdated by:  RHSA-2015:1091
    MD5: 83eeb59345281b1c1a981e1a36824678
SHA-256: 4cbf61b4f2425f6512ab3249c151cb116a95ffd839d2fbe26bed03673477bc66
 
Red Hat Satellite (v. 5.6 for RHEL 6)

SRPMS:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el6.src.rpm
File outdated by:  RHSA-2015:1091
    MD5: f74da299ca95c81ffdb6fcbb19ec12aa
SHA-256: 0ff0e759826778b16458a96511dbfa4538182bc07a74872d40c55c8e7b54afc8
 
s390x:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el6.s390x.rpm
File outdated by:  RHSA-2015:1091
    MD5: e905c24aa9492eb15fd37d6be2f267dd
SHA-256: 986b0a3020ea25fe70968a7de9ab98460eae1f6cdc3a6a11e14fb411868a0fc7
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el6.s390x.rpm
File outdated by:  RHSA-2015:1091
    MD5: b486ecb68423edbeeaf3e91e1756c253
SHA-256: fe864143c1986dd7bd295a9653b4883fe934c8528dc24083f0b1415612e967fb
 
x86_64:
java-1.6.0-ibm-1.6.0.16.0-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:1091
    MD5: ba5eab150b0d72b42ba64a2937c3a1fe
SHA-256: d206b485af59a65ee4e376c42fc8a717ce39f2520b389200b289284949bc07cd
java-1.6.0-ibm-devel-1.6.0.16.0-1jpp.1.el6.x86_64.rpm
File outdated by:  RHSA-2015:1091
    MD5: ece417c6b96cb1eeeb3eeac5a2dd4f2a
SHA-256: 6bfb18e2d77af7cd6f00d6e16d23c41ba8f20a9e5883e4f8e62f4b7cef4064c0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1031734 - CVE-2013-6629 libjpeg: information leak (read of uninitialized memory)
1045561 - CVE-2013-6954 libpng: unhandled zero-length PLTE chunk or NULL palette
1051519 - CVE-2014-0428 OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767)
1051528 - CVE-2014-0422 OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758)
1051699 - CVE-2014-0373 OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126)
1051823 - CVE-2013-5878 OpenJDK: null xmlns handling issue (Security, 8025026)
1051911 - CVE-2013-5884 OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193)
1051912 - CVE-2014-0416 OpenJDK: insecure subject principals set handling (JAAS, 8024306)
1051923 - CVE-2014-0376 OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018)
1052915 - CVE-2013-5907 ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034)
1052919 - CVE-2014-0368 OpenJDK: insufficient Socket checkListen checks (Networking, 8011786)
1052942 - CVE-2013-5910 OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417)
1053010 - CVE-2014-0411 OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069)
1053066 - CVE-2014-0423 OpenJDK: XXE issue in decoder (Beans, 8023245)
1053266 - CVE-2013-5896 OpenJDK: com.sun.corba.se. should be restricted package (CORBA, 8025022)
1053495 - CVE-2014-0410 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment)
1053496 - CVE-2014-0415 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment)
1053499 - CVE-2013-5889 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment)
1053501 - CVE-2014-0417 Oracle JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (2D)
1053502 - CVE-2014-0387 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment)
1053504 - CVE-2014-0424 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment)
1053507 - CVE-2014-0403 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment)
1053508 - CVE-2014-0375 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment)
1053515 - CVE-2013-5887 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment)
1053516 - CVE-2013-5899 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment)
1053517 - CVE-2013-5888 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment)
1053518 - CVE-2013-5898 Oracle JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment)
1060907 - CVE-2014-1876 OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618)
1086632 - CVE-2014-2398 OpenJDK: insufficient escaping of window title string (Javadoc, 8026736)
1086645 - CVE-2014-0453 OpenJDK: RSA unpadding timing issues (Security, 8027766)
1087409 - CVE-2014-0429 OpenJDK: Incorrect mlib/raster image validation (2D, 8027841)
1087411 - CVE-2014-0457 OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394)
1087417 - CVE-2014-2421 OpenJDK: JPEG decoder input stream handling (2D, 8029854)
1087426 - CVE-2014-0461 OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794)
1087427 - CVE-2014-2412 OpenJDK: AWT thread context handling (AWT, 8025010)
1087428 - CVE-2014-0451 OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797)
1087430 - CVE-2014-0458 OpenJDK: Activation framework default command map caching (JAX-WS, 8025152)
1087431 - CVE-2014-2414 OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030)
1087434 - CVE-2014-2423 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188)
1087436 - CVE-2014-0452 OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801)
1087439 - CVE-2014-0446 OpenJDK: Protect logger handlers (Libraries, 8029740)
1087441 - CVE-2014-2427 OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163)
1087442 - CVE-2014-0460 OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731)
1088025 - CVE-2014-2428 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment)
1088027 - CVE-2014-2409 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment)
1088028 - CVE-2014-0449 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment)
1088030 - CVE-2014-2401 Oracle JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D)
1088031 - CVE-2014-2420 Oracle JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment)
1097345 - CVE-2014-0878 IBM JDK: Vulnerability in the IBMSecureRandom implementation of the IBMJCE and IBMSecureRandom cryptographic providers


References

https://www.redhat.com/security/data/cve/CVE-2013-5878.html
https://www.redhat.com/security/data/cve/CVE-2013-5884.html
https://www.redhat.com/security/data/cve/CVE-2013-5887.html
https://www.redhat.com/security/data/cve/CVE-2013-5888.html
https://www.redhat.com/security/data/cve/CVE-2013-5889.html
https://www.redhat.com/security/data/cve/CVE-2013-5896.html
https://www.redhat.com/security/data/cve/CVE-2013-5898.html
https://www.redhat.com/security/data/cve/CVE-2013-5899.html
https://www.redhat.com/security/data/cve/CVE-2013-5907.html
https://www.redhat.com/security/data/cve/CVE-2013-5910.html
https://www.redhat.com/security/data/cve/CVE-2013-6629.html
https://www.redhat.com/security/data/cve/CVE-2013-6954.html
https://www.redhat.com/security/data/cve/CVE-2014-0368.html
https://www.redhat.com/security/data/cve/CVE-2014-0373.html
https://www.redhat.com/security/data/cve/CVE-2014-0375.html
https://www.redhat.com/security/data/cve/CVE-2014-0376.html
https://www.redhat.com/security/data/cve/CVE-2014-0387.html
https://www.redhat.com/security/data/cve/CVE-2014-0403.html
https://www.redhat.com/security/data/cve/CVE-2014-0410.html
https://www.redhat.com/security/data/cve/CVE-2014-0411.html
https://www.redhat.com/security/data/cve/CVE-2014-0415.html
https://www.redhat.com/security/data/cve/CVE-2014-0416.html
https://www.redhat.com/security/data/cve/CVE-2014-0417.html
https://www.redhat.com/security/data/cve/CVE-2014-0422.html
https://www.redhat.com/security/data/cve/CVE-2014-0423.html
https://www.redhat.com/security/data/cve/CVE-2014-0424.html
https://www.redhat.com/security/data/cve/CVE-2014-0428.html
https://www.redhat.com/security/data/cve/CVE-2014-0429.html
https://www.redhat.com/security/data/cve/CVE-2014-0446.html
https://www.redhat.com/security/data/cve/CVE-2014-0449.html
https://www.redhat.com/security/data/cve/CVE-2014-0451.html
https://www.redhat.com/security/data/cve/CVE-2014-0452.html
https://www.redhat.com/security/data/cve/CVE-2014-0453.html
https://www.redhat.com/security/data/cve/CVE-2014-0457.html
https://www.redhat.com/security/data/cve/CVE-2014-0458.html
https://www.redhat.com/security/data/cve/CVE-2014-0460.html
https://www.redhat.com/security/data/cve/CVE-2014-0461.html
https://www.redhat.com/security/data/cve/CVE-2014-0878.html
https://www.redhat.com/security/data/cve/CVE-2014-1876.html
https://www.redhat.com/security/data/cve/CVE-2014-2398.html
https://www.redhat.com/security/data/cve/CVE-2014-2401.html
https://www.redhat.com/security/data/cve/CVE-2014-2409.html
https://www.redhat.com/security/data/cve/CVE-2014-2412.html
https://www.redhat.com/security/data/cve/CVE-2014-2414.html
https://www.redhat.com/security/data/cve/CVE-2014-2420.html
https://www.redhat.com/security/data/cve/CVE-2014-2421.html
https://www.redhat.com/security/data/cve/CVE-2014-2423.html
https://www.redhat.com/security/data/cve/CVE-2014-2427.html
https://www.redhat.com/security/data/cve/CVE-2014-2428.html
https://access.redhat.com/security/updates/classification/#low
https://www.ibm.com/developerworks/java/jdk/alerts/


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/