First published: Mon Jul 15 2013(Updated: )
IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM<br>Java Software Development Kit.<br>This update fixes several vulnerabilities in the IBM Java Runtime<br>Environment and the IBM Java Software Development Kit. Detailed<br>vulnerability descriptions are linked from the IBM Security alerts page,<br>listed in the References section. (CVE-2013-1500, CVE-2013-1571,<br>CVE-2013-2400, CVE-2013-2407, CVE-2013-2412, CVE-2013-2437, CVE-2013-2442,<br>CVE-2013-2444, CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2449,<br>CVE-2013-2450, CVE-2013-2451, CVE-2013-2452, CVE-2013-2453, CVE-2013-2454,<br>CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2458, CVE-2013-2459,<br>CVE-2013-2460, CVE-2013-2462, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465,<br>CVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471,<br>CVE-2013-2472, CVE-2013-2473, CVE-2013-3744)<br>Red Hat would like to thank Tim Brown for reporting CVE-2013-1500, and<br>US-CERT for reporting CVE-2013-1571. US-CERT acknowledges Oracle as the<br>original reporter of CVE-2013-1571.<br>All users of java-1.7.0-ibm are advised to upgrade to these updated<br>packages, containing the IBM Java SE 7 SR5 release. All running<br>instances of IBM Java must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4 | 1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el6_4 |
redhat/java | <1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9 |
redhat/java | <1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-1.7.0.5.0-1jpp.2.el5_9 |
redhat/java | <1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9 |
redhat/java | <1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-demo-1.7.0.5.0-1jpp.2.el5_9 |
redhat/java | <1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9 |
redhat/java | <1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-devel-1.7.0.5.0-1jpp.2.el5_9 |
redhat/java | <1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9 |
redhat/java | <1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-jdbc-1.7.0.5.0-1jpp.2.el5_9 |
redhat/java | <1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el5_9 |
redhat/java | <1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-plugin-1.7.0.5.0-1jpp.2.el5_9 |
redhat/java | <1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9 |
redhat/java | <1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9 | 1.7.0-ibm-src-1.7.0.5.0-1jpp.2.el5_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.