Login   |   Secure Purdue > News

Red Hat critical java-1.7.0-oracle security update


***UPDATED***
Tuesday, October 22, 2013 15:00:00 EDT

Red Hat has issued an update for java-1.7.0-openjdk which fixes
multiple vulnerabilities. These vulnerabilities can be exploited by
malicious users to disclose potentially sensitive information,
manipulate certain data, cause a DoS (Denial of Service), or compromise
a vulnerable system.

Ensure that Red Hat products are up to date with the latest patches.

Further Information: h t t p s:// r h n.redhat.com/errata/RHSA-2013-1447.html

(remove spaces from links)

*************

STEAM-ADVISORY NO. 2013102102

PURDUE UNIVERSITY SECURITY STEAM CIRT
Monday, October 21, 2013 17:00:00 EDT


==OVERVIEW==


Red Hat critical java-1.7.0-oracle security update


==SYSTEMS AFFECTED==

Red Hat Enterprise Linux Desktop Supplementary (v. 6)
Red Hat Enterprise Linux HPC Node Supplementary (v. 6)
Red Hat Enterprise Linux Server Supplementary (v. 6)
Red Hat Enterprise Linux Workstation Supplementary (v. 6)
RHEL Supplementary (v. 5 server)


==DETAILS==

Red Hat has issued an update for java-1.7.0-oracle. This fixes multiple
vulnerabilities, which can be exploited by malicious users to manipulate
certain data and by malicious people to disclose potentially sensitive
information, manipulate certain data, cause a DoS (Denial of Service),
and compromise a vulnerable system. The Red Hat Security Response Team
has rated this update as having critical
security impact.


==SOLUTIONS==


Ensure that Red Hat products are up to date with the latest patches.


==FURTHER INFORMATION AND RESOURCES==

Red Hat Advisory

h t t p s :// r h n .redhat.com/errata/RHSA-2013-1440.html

(remove spaces from links)


==STEAM-CIRT CONTACT INFORMATION==


For questions concerning this advisory, please send email to:
itap-securityhelp@purdue.edu.

Report computer-related abuse to steam-cirt:
http://w w w .purdue.edu/securePurdue/incidentReportForm.cfm


http://w w w .purdue.edu/securepurdue/steam


(remove spaces from links)

Posted by ITSP on October 21, 2013, in Advisory Alerts.