An unspecified Java sandbox bypass issue in the JVM component was fixed in IBM JDK 7 SR6, 6 SR15 and 5.0 SR16-FP4. This issue got the following CVSSv2 score upstream: 6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P https://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2013 https://www.ibm.com/developerworks/java/jdk/aix/j732/Java7.fixes.html#SR6 https://www.ibm.com/developerworks/java/jdk/aix/j632/Java6.fixes.html#SR15 https://www.ibm.com/developerworks/java/jdk/aix/j532/fixes.html#SR16FP4 Further info is available in this WebSphere Real Time security bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21655202&myns=swgws&mynp=OCSSSTCZ&mync=R CVE-2013-4041 and CVE-2013-5375 allow code running under a security manager to access restricted classes. Additional details may become available under this X-Force database article: http://xforce.iss.net/xforce/xfdb/86416
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 6 Supplementary for Red Hat Enterprise Linux 5 Via RHSA-2013:1509 https://rhn.redhat.com/errata/RHSA-2013-1509.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2013:1508 https://rhn.redhat.com/errata/RHSA-2013-1508.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2013:1507 https://rhn.redhat.com/errata/RHSA-2013-1507.html
This issue has been addressed in following products: Red Hat Network Satellite Server v 5.4 Red Hat Network Satellite Server v 5.5 Red Hat Satellite Server v 5.6 Via RHSA-2013:1793 https://rhn.redhat.com/errata/RHSA-2013-1793.html