First published: Thu Nov 07 2013(Updated: )
IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM<br>Java Software Development Kit.<br>This update fixes several vulnerabilities in the IBM Java Runtime<br>Environment and the IBM Java Software Development Kit. Detailed<br>vulnerability descriptions are linked from the IBM Security alerts page,<br>listed in the References section. (CVE-2013-3829, CVE-2013-4041,<br>CVE-2013-5372, CVE-2013-5375, CVE-2013-5456, CVE-2013-5457, CVE-2013-5458,<br>CVE-2013-5772, CVE-2013-5774, CVE-2013-5776, CVE-2013-5778, CVE-2013-5780,<br>CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5787, CVE-2013-5788,<br>CVE-2013-5789, CVE-2013-5790, CVE-2013-5797, CVE-2013-5800, CVE-2013-5801,<br>CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809, CVE-2013-5812,<br>CVE-2013-5814, CVE-2013-5817, CVE-2013-5818, CVE-2013-5819, CVE-2013-5820,<br>CVE-2013-5823, CVE-2013-5824, CVE-2013-5825, CVE-2013-5829, CVE-2013-5830,<br>CVE-2013-5831, CVE-2013-5832, CVE-2013-5838, CVE-2013-5840, CVE-2013-5842,<br>CVE-2013-5843, CVE-2013-5848, CVE-2013-5849, CVE-2013-5850, CVE-2013-5851)<br>All users of java-1.7.0-ibm are advised to upgrade to these updated<br>packages, containing the IBM Java SE 7 SR6 release. All running<br>instances of IBM Java must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.7.0-ibm-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-demo-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-demo-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-devel-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-devel-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-jdbc-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-jdbc-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-plugin-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-plugin-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-src-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-src-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-demo-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-demo-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-devel-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-devel-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-jdbc-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-jdbc-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-plugin-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-plugin-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-src-1.7.0.6.0-1jpp.1.el6_4 | 1.7.0-ibm-src-1.7.0.6.0-1jpp.1.el6_4 |
redhat/java | <1.7.0-ibm-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-1.7.0.6.0-1jpp.1.el5_10 |
redhat/java | <1.7.0-ibm-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-1.7.0.6.0-1jpp.1.el5_10 |
redhat/java | <1.7.0-ibm-demo-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-demo-1.7.0.6.0-1jpp.1.el5_10 |
redhat/java | <1.7.0-ibm-demo-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-demo-1.7.0.6.0-1jpp.1.el5_10 |
redhat/java | <1.7.0-ibm-devel-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-devel-1.7.0.6.0-1jpp.1.el5_10 |
redhat/java | <1.7.0-ibm-devel-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-devel-1.7.0.6.0-1jpp.1.el5_10 |
redhat/java | <1.7.0-ibm-jdbc-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-jdbc-1.7.0.6.0-1jpp.1.el5_10 |
redhat/java | <1.7.0-ibm-jdbc-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-jdbc-1.7.0.6.0-1jpp.1.el5_10 |
redhat/java | <1.7.0-ibm-plugin-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-plugin-1.7.0.6.0-1jpp.1.el5_10 |
redhat/java | <1.7.0-ibm-plugin-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-plugin-1.7.0.6.0-1jpp.1.el5_10 |
redhat/java | <1.7.0-ibm-src-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-src-1.7.0.6.0-1jpp.1.el5_10 |
redhat/java | <1.7.0-ibm-src-1.7.0.6.0-1jpp.1.el5_10 | 1.7.0-ibm-src-1.7.0.6.0-1jpp.1.el5_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.