Unfortunately, I do not know.

Pat

On 02/05/2013 11:13 AM, Robert Blair wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Are the open source versions subject to similar issues?  I see the
openjdk.org site has recent security updates but there don't seem to be
corresponding updates to TUV rpm's.

Thanks,
Bob Blair


On 02/05/2013 11:07 AM, Pat Riehecky wrote:
Security packages for Java posted for testing at

ftp://ftp.scientificlinux.org/linux/scientific/5rolling/testing/i386/
ftp://ftp.scientificlinux.org/linux/scientific/5rolling/testing/x86_64/

Next week these packages will be officially released.  This delay is to
allow you time to test and verify your production applications will run
as expected once this security update is applied.

If you do not want this security update please consult your site's
local security policy to determine how you should proceed.  Scientific
Linux will automatically feature this update next week.

As a reminder, the closed source Java6 packages are not present in
Scientific Linux 5.9.  Public updates to the closed source package
are being discontinued by upstream.  Scientific Linux 6 has never
included the closed source Java packages.

http://www.oracle.com/technetwork/java/eol-135779.html


The update advisory is posted below:

Synopsis: Critical: jdk-1.6.0 security update
Issue Date: 2013-02-01
CVE Numbers:  CVE-2012-1541 CVE-2012-3213 CVE-2012-3342
               CVE-2013-0351 CVE-2013-0409 CVE-2013-0419
               CVE-2013-0423 CVE-2013-0424 CVE-2013-0425
               CVE-2013-0426 CVE-2013-0427 CVE-2013-0428
               CVE-2013-0429 CVE-2013-0430 CVE-2013-0432
               CVE-2013-0433 CVE-2013-0434 CVE-2013-0435
               CVE-2013-0438 CVE-2013-0440 CVE-2013-0441
               CVE-2013-0442 CVE-2013-0443 CVE-2013-0445
               CVE-2013-0446 CVE-2013-0450 CVE-2013-1473
               CVE-2013-1475 CVE-2013-1476 CVE-2013-1478
               CVE-2013-1480 CVE-2013-1481

This update fixes several vulnerabilities in the Oracle Java Runtime
Environment and the Oracle Java Software Development Kit. Further
information about these flaws can be found on the Oracle Java SE
Critical Patch Update Advisory page
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.14 (GNU/Linux)

iQEcBAEBAgAGBQJRET2mAAoJEPQM1KNWz8QashMIAK6s9yqG/tSzvcIAUj21SVQp
BWLW3Bqtc503H6W6uXz+BBgr2b/ov3UOxWnSkCAUcHoKUKG+r4Z8K+PA2m5dl9z+
ghD88CR5+qxPPoskYkm04mBNSCc9NHastz5AzfDPpzRLUT5TCC3PvCB9Ha8za9In
Jb6csORr7yZEhMKstTDld3m0S9GKkFksyyMIzDnn6EpDrVyQlYjZmylE2r4Nouen
g9AWOoj82rPUHvh9LTBi/LSm1PUxgVHnOJ5a/rh/GdqXFu6iXD0XkkFgyxPTaRnO
hjetVaWGlpqaciZKI18W3uPVLTTGeNWo+0dAMwLG3lnrCAKdyW3j4fKLuoRzbXU=
=Hd71
-----END PGP SIGNATURE-----


--
Pat Riehecky
Scientific Linux Developer

Reply via email to