First published: Tue Sep 18 2012(Updated: )
IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM<br>Java Software Development Kit.<br>This update fixes several vulnerabilities in the IBM Java Runtime<br>Environment and the IBM Java Software Development Kit. Detailed<br>vulnerability descriptions are linked from the IBM Security alerts page,<br>listed in the References section. (CVE-2012-0547, CVE-2012-0551,<br>CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1719,<br>CVE-2012-1721, CVE-2012-1722, CVE-2012-1725, CVE-2012-1726, CVE-2012-3136,<br>CVE-2012-4681)<br>All users of java-1.7.0-ibm are advised to upgrade to these updated<br>packages, containing the IBM Java SE 7 SR2 release. All running instances<br>of IBM Java must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3 |
redhat/java | <1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3 |
redhat/java | <1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3 |
redhat/java | <1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3 |
redhat/java | <1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3 |
redhat/java | <1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3 |
redhat/java | <1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-1.7.0.2.0-1jpp.3.el6_3 |
redhat/java | <1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-demo-1.7.0.2.0-1jpp.3.el6_3 |
redhat/java | <1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-devel-1.7.0.2.0-1jpp.3.el6_3 |
redhat/java | <1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-jdbc-1.7.0.2.0-1jpp.3.el6_3 |
redhat/java | <1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-plugin-1.7.0.2.0-1jpp.3.el6_3 |
redhat/java | <1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3 | 1.7.0-ibm-src-1.7.0.2.0-1jpp.3.el6_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.