{"id":"RHSA-2013:0823","summary":"Red Hat Security Advisory: java-1.6.0-ibm security update","modified":"2026-05-15T10:01:56Z","published":"2024-09-13T08:02:30Z","upstream":["CVE-2013-0169","CVE-2013-0401","CVE-2013-1491","CVE-2013-1537","CVE-2013-1540","CVE-2013-1557","CVE-2013-1563","CVE-2013-1569","CVE-2013-2383","CVE-2013-2384","CVE-2013-2394","CVE-2013-2417","CVE-2013-2418","CVE-2013-2419","CVE-2013-2420","CVE-2013-2422","CVE-2013-2424","CVE-2013-2429","CVE-2013-2430","CVE-2013-2432","CVE-2013-2433","CVE-2013-2435","CVE-2013-2440"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2013:0823"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"ARTICLE","url":"https://www.ibm.com/developerworks/java/jdk/alerts/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=907589"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=920245"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=920248"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952387"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952509"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952521"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952524"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952638"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952642"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952648"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952656"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952657"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952708"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952709"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=952711"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=953166"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=953172"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=953265"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=953267"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=953269"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=953270"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=953273"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=953275"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0823.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-0169"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-0169"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0169"},{"type":"ARTICLE","url":"http://www.isg.rhul.ac.uk/tls/"},{"type":"ARTICLE","url":"http://www.openssl.org/news/secadv_20130205.txt"},{"type":"ARTICLE","url":"https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-0401"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-0401"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0401"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-1491"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-1491"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1491"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-1537"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-1537"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1537"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-1540"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-1540"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1540"},{"type":"ARTICLE","url":"http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-1557"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-1557"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1557"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-1563"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-1563"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1563"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-1569"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-1569"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1569"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2383"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2383"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2383"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2384"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2384"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2384"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2394"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2394"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2394"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2417"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2417"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2417"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2418"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2418"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2418"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2419"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2419"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2419"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2420"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2420"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2420"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2422"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2422"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2422"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2424"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2424"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2424"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2429"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2429"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2429"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2430"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2430"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2430"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2432"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2432"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2432"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2433"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2433"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2433"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2435"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2435"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2435"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-2440"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-2440"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2440"}],"affected":[{"package":{"name":"java-1.6.0-ibm","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/java-1.6.0-ibm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el5_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-accessibility","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/java-1.6.0-ibm-accessibility"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el5_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-demo","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/java-1.6.0-ibm-demo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el5_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-devel","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/java-1.6.0-ibm-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el5_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-javacomm","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/java-1.6.0-ibm-javacomm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el5_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-jdbc","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/java-1.6.0-ibm-jdbc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el5_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-plugin","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/java-1.6.0-ibm-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el5_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-src","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/java-1.6.0-ibm-src"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el5_9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/java-1.6.0-ibm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el6_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-demo","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/java-1.6.0-ibm-demo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el6_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-devel","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/java-1.6.0-ibm-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el6_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-javacomm","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/java-1.6.0-ibm-javacomm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el6_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-jdbc","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/java-1.6.0-ibm-jdbc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el6_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-plugin","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/java-1.6.0-ibm-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el6_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}},{"package":{"name":"java-1.6.0-ibm-src","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/java-1.6.0-ibm-src"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.6.0.13.2-1jpp.1.el6_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0823.json"}}],"schema_version":"1.7.5"}