First published: Tue May 14 2013(Updated: )
IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM<br>Java Software Development Kit.<br>This update fixes several vulnerabilities in the IBM Java Runtime<br>Environment and the IBM Java Software Development Kit. Detailed<br>vulnerability descriptions are linked from the IBM Security alerts page,<br>listed in the References section. (CVE-2013-0169, CVE-2013-0401,<br>CVE-2013-1491, CVE-2013-1537, CVE-2013-1540, CVE-2013-1557, CVE-2013-1563,<br>CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2394, CVE-2013-2417,<br>CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424,<br>CVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435,<br>CVE-2013-2440)<br>All users of java-1.6.0-ibm are advised to upgrade to these updated<br>packages, containing the IBM Java SE 6 SR13-FP2 release. All running<br>instances of IBM Java must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.6.0-ibm-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-demo-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-demo-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-devel-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-devel-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-devel-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-devel-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-javacomm-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-jdbc-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-plugin-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-src-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-src-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-demo-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-demo-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-javacomm-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-jdbc-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-plugin-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-src-1.6.0.13.2-1jpp.1.el6_4 | 1.6.0-ibm-src-1.6.0.13.2-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-accessibility-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-accessibility-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-demo-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-demo-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-demo-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-demo-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-devel-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-devel-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-devel-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-devel-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-javacomm-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-javacomm-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-jdbc-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-jdbc-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-plugin-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-plugin-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-src-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-src-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-src-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-src-1.6.0.13.2-1jpp.1.el5_9 |
redhat/java | <1.6.0-ibm-accessibility-1.6.0.13.2-1jpp.1.el5_9 | 1.6.0-ibm-accessibility-1.6.0.13.2-1jpp.1.el5_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2013:0823 is moderate due to multiple vulnerabilities addressed in various IBM Java SE packages.
To fix RHSA-2013:0823, you need to update affected IBM Java SE packages to the recommended versions provided in the advisory.
RHSA-2013:0823 affects various versions of the IBM Java Runtime Environment and Java Software Development Kit.
RHSA-2013:0823 addresses several vulnerabilities that could potentially lead to security risks in Java applications.
If you are not using IBM Java SE products or any of the affected packages, you may not need to apply the update for RHSA-2013:0823.