First published: Thu Nov 07 2013(Updated: )
IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM<br>Java Software Development Kit.<br>This update fixes several vulnerabilities in the IBM Java Runtime<br>Environment and the IBM Java Software Development Kit. Detailed<br>vulnerability descriptions are linked from the IBM Security alerts page,<br>listed in the References section. (CVE-2013-3829, CVE-2013-4041,<br>CVE-2013-5372, CVE-2013-5375, CVE-2013-5457, CVE-2013-5772, CVE-2013-5774,<br>CVE-2013-5776, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783,<br>CVE-2013-5784, CVE-2013-5787, CVE-2013-5789, CVE-2013-5797, CVE-2013-5801,<br>CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809, CVE-2013-5812,<br>CVE-2013-5814, CVE-2013-5817, CVE-2013-5818, CVE-2013-5819, CVE-2013-5820,<br>CVE-2013-5823, CVE-2013-5824, CVE-2013-5825, CVE-2013-5829, CVE-2013-5830,<br>CVE-2013-5831, CVE-2013-5832, CVE-2013-5840, CVE-2013-5842, CVE-2013-5843,<br>CVE-2013-5848, CVE-2013-5849, CVE-2013-5850, CVE-2013-5851)<br>All users of java-1.6.0-ibm are advised to upgrade to these updated<br>packages, containing the IBM Java SE 6 SR15 release. All running<br>instances of IBM Java must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.6.0-ibm-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-demo-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-demo-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-devel-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-devel-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-devel-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-devel-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-javacomm-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-jdbc-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-plugin-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-src-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-src-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-demo-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-demo-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-javacomm-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-jdbc-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-plugin-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-src-1.6.0.15.0-1jpp.1.el6_4 | 1.6.0-ibm-src-1.6.0.15.0-1jpp.1.el6_4 |
redhat/java | <1.6.0-ibm-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-accessibility-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-accessibility-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-demo-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-demo-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-demo-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-demo-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-devel-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-devel-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-devel-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-devel-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-javacomm-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-javacomm-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-jdbc-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-jdbc-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-plugin-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-plugin-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-src-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-src-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-src-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-src-1.6.0.15.0-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-accessibility-1.6.0.15.0-1jpp.1.el5_10 | 1.6.0-ibm-accessibility-1.6.0.15.0-1jpp.1.el5_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2013:1508 is classified as important due to multiple vulnerabilities that may allow for potential exploitation.
To fix RHSA-2013:1508, you need to upgrade to the updated package versions specifically mentioned in the advisory for your affected software.
Affected software packages include various versions of IBM Java SE, such as java, java-demo, java-devel, java-javacomm, java-jdbc, and java-plugin.
Not applying the fix for RHSA-2013:1508 can leave your system vulnerable to exploitation, potentially leading to unauthorized access or data breaches.
The RHSA-2013:1508 advisory was released on November 12, 2013.