ELSA-2013-0602

ELSA-2013-0602 - java-1.7.0-openjdk security update

Type:SECURITY
Impact:CRITICAL
Release Date:2013-03-06

Description


[1.7.0.9-2.3.8.0.0.1.el6_4]
- Update DISTRO_NAME in specfile

[1.7.0.9-2.3.8.0el6]
- Revert to rhel 6.3 version of spec file
- Revert to icedtea7 2.3.8 forest
- Resolves: rhbz#917183

[1.7.0.11-2.4.0.pre5.el6]
- Update to latest snapshot of icedtea7 2.4 forest
- Resolves: rhbz#917183

[1.7.0.9-2.4.0.pre4.3.el6]
- Updated to icedtea 2.4.0.pre4,
- Rewritten (again) patch3 java-1.7.0-openjdk-java-access-bridge-security.patch
- Resolves: rhbz#911530

[1.7.0.9-2.4.0.pre3.3.el6]
- Updated to icedtea 2.4.0.pre3, updated!
- Rewritten patch3 java-1.7.0-openjdk-java-access-bridge-security.patch
- Resolves: rhbz#911530

[1.7.0.9-2.4.0.pre2.3.el6]
- Removed testing
- mauve was outdated and
- jtreg was icedtea relict
- Updated to icedtea 2.4.0.pre2, updated?
- Added java -Xshare:dump to post (see 513605) fo jitarchs
- Resolves: rhbz#911530

[1.7.0.11-2.4.0.2.el6]
- Unapplied but kept (for 2.3revert) patch110, java-1.7.0-openjdk-nss-icedtea-e9c857dcb964.patch
- Added and applied patch113: java-1.7.0-openjdk-aes-update_reset.patch
- Added and applied patch114: java-1.7.0-openjdk-nss-tck.patch
- Added and applied patch115: java-1.7.0-openjdk-nss-split_results.patch
- NSS enabled by default - enable_nss set to 1
- rewritten patch109 - java-1.7.0-openjdk-nss-config-1.patch
- rewritten patch111 - java-1.7.0-openjdk-nss-config-2.patch
- Resolves: rhbz#831734

[1.7.0.11-2.4.0.1.el6]
- Rewritten patch105: java-1.7.0-openjdk-disable-system-lcms.patch
- Added jxmd and idlj to alternatives
- make executed with DISABLE_INTREE_EC=true and UNLIMITED_CRYPTO=true
- Unapplied patch302 and deleted systemtap.patch
- buildver increased to 11
- icedtea_version set to 2.4.0
- Added and applied patch112 java-1.7.openjdk-doNotUseDisabledEcc.patch
- removed tmp-patches source tarball
- Added /lib/security/US_export_policy.jar and lib/security/local_policy.jar
- Disabled nss - enable_nss set to 0
- Resolves: rhbz#895034


Related CVEs


CVE-2013-0809
CVE-2013-1493

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) java-1.7.0-openjdk-1.7.0.9-2.3.8.0.0.1.el6_4.src.rpm6f20afb88f75fb5206456515c1ede742599f0b5425055979deb292dda4646530ELSA-2020-1508ol6_i386_latest_archive
java-1.7.0-openjdk-1.7.0.9-2.3.8.0.0.1.el6_4.src.rpm6f20afb88f75fb5206456515c1ede742599f0b5425055979deb292dda4646530ELSA-2020-1508ol6_u4_i386_patch
java-1.7.0-openjdk-1.7.0.9-2.3.8.0.0.1.el6_4.i686.rpmcc3c422bdecd015c2f82c71985b3ea7bd14cfcd58b5392eeeee7d7d6303da950ELSA-2020-1508ol6_i386_latest_archive
java-1.7.0-openjdk-1.7.0.9-2.3.8.0.0.1.el6_4.i686.rpmcc3c422bdecd015c2f82c71985b3ea7bd14cfcd58b5392eeeee7d7d6303da950ELSA-2020-1508ol6_u4_i386_patch
java-1.7.0-openjdk-demo-1.7.0.9-2.3.8.0.0.1.el6_4.i686.rpm3c14bb6d732415025a1d51c370ea8eb76465279b6008b6a1aabbe4cd15bb6c25ELSA-2020-1508ol6_i386_latest_archive
java-1.7.0-openjdk-demo-1.7.0.9-2.3.8.0.0.1.el6_4.i686.rpm3c14bb6d732415025a1d51c370ea8eb76465279b6008b6a1aabbe4cd15bb6c25ELSA-2020-1508ol6_u4_i386_patch
java-1.7.0-openjdk-devel-1.7.0.9-2.3.8.0.0.1.el6_4.i686.rpm1bd9730b75e963c1cca1d2395adf12c80a03769956cd0e2aea9771beca7ceb29ELSA-2020-1508ol6_i386_latest_archive
java-1.7.0-openjdk-devel-1.7.0.9-2.3.8.0.0.1.el6_4.i686.rpm1bd9730b75e963c1cca1d2395adf12c80a03769956cd0e2aea9771beca7ceb29ELSA-2020-1508ol6_u4_i386_patch
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.8.0.0.1.el6_4.noarch.rpmadb5cea5551971070e823ffcfe276a15d2b273cfe8790025f54e9eb266db537fELSA-2020-1508ol6_i386_latest_archive
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.8.0.0.1.el6_4.noarch.rpmadb5cea5551971070e823ffcfe276a15d2b273cfe8790025f54e9eb266db537fELSA-2020-1508ol6_u4_i386_patch
java-1.7.0-openjdk-src-1.7.0.9-2.3.8.0.0.1.el6_4.i686.rpm9b399f660e9f6a8a085d7571cc1a41e80174d7c16b2e4aec7da49142d0afce22ELSA-2020-1508ol6_i386_latest_archive
java-1.7.0-openjdk-src-1.7.0.9-2.3.8.0.0.1.el6_4.i686.rpm9b399f660e9f6a8a085d7571cc1a41e80174d7c16b2e4aec7da49142d0afce22ELSA-2020-1508ol6_u4_i386_patch
Oracle Linux 6 (x86_64) java-1.7.0-openjdk-1.7.0.9-2.3.8.0.0.1.el6_4.src.rpm6f20afb88f75fb5206456515c1ede742599f0b5425055979deb292dda4646530ELSA-2020-1508ol6_u4_x86_64_patch
java-1.7.0-openjdk-1.7.0.9-2.3.8.0.0.1.el6_4.src.rpm6f20afb88f75fb5206456515c1ede742599f0b5425055979deb292dda4646530ELSA-2020-1508ol6_x86_64_latest_archive
java-1.7.0-openjdk-1.7.0.9-2.3.8.0.0.1.el6_4.x86_64.rpm0fede71937acf26af5fe9713866a5cfe2fd5d0da50e975edd602de12b303fae7ELSA-2020-1508ol6_u4_x86_64_patch
java-1.7.0-openjdk-1.7.0.9-2.3.8.0.0.1.el6_4.x86_64.rpm0fede71937acf26af5fe9713866a5cfe2fd5d0da50e975edd602de12b303fae7ELSA-2020-1508ol6_x86_64_latest_archive
java-1.7.0-openjdk-demo-1.7.0.9-2.3.8.0.0.1.el6_4.x86_64.rpmc00017dd5aea9e1142f90bc6737a01d231f2ace24fdc8a3ce593ca9e98f85c43ELSA-2020-1508ol6_u4_x86_64_patch
java-1.7.0-openjdk-demo-1.7.0.9-2.3.8.0.0.1.el6_4.x86_64.rpmc00017dd5aea9e1142f90bc6737a01d231f2ace24fdc8a3ce593ca9e98f85c43ELSA-2020-1508ol6_x86_64_latest_archive
java-1.7.0-openjdk-devel-1.7.0.9-2.3.8.0.0.1.el6_4.x86_64.rpm658dddaf931fdebfe64f5a7993eb846c1eb77158805f4fc63cc2127d77bd9e57ELSA-2020-1508ol6_u4_x86_64_patch
java-1.7.0-openjdk-devel-1.7.0.9-2.3.8.0.0.1.el6_4.x86_64.rpm658dddaf931fdebfe64f5a7993eb846c1eb77158805f4fc63cc2127d77bd9e57ELSA-2020-1508ol6_x86_64_latest_archive
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.8.0.0.1.el6_4.noarch.rpmadb5cea5551971070e823ffcfe276a15d2b273cfe8790025f54e9eb266db537fELSA-2020-1508ol6_u4_x86_64_patch
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.8.0.0.1.el6_4.noarch.rpmadb5cea5551971070e823ffcfe276a15d2b273cfe8790025f54e9eb266db537fELSA-2020-1508ol6_x86_64_latest_archive
java-1.7.0-openjdk-src-1.7.0.9-2.3.8.0.0.1.el6_4.x86_64.rpm131bf909c20b359ce75654da7f3f5c0d1754617c5e2c1112caeb40f5a17c60c9ELSA-2020-1508ol6_u4_x86_64_patch
java-1.7.0-openjdk-src-1.7.0.9-2.3.8.0.0.1.el6_4.x86_64.rpm131bf909c20b359ce75654da7f3f5c0d1754617c5e2c1112caeb40f5a17c60c9ELSA-2020-1508ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete