First published: Wed Apr 27 2016(Updated: )
A buffer overflow flaw was fixed in IBM JDK 6 SR16-FP25, 7 SR9-FP40, 7R1 SR3-FP40, and 8 SR3: CVEID: <a href="https://access.redhat.com/security/cve/CVE-2016-0264">CVE-2016-0264</a> DESCRIPTION: A buffer overflow vulnerability in the IBM JVM facilitates arbitrary code execution under certain limited circumstances. CVSS Base Score: 5.6 CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) <a href="http://www-01.ibm.com/support/docview.wss?uid=swg21980826">http://www-01.ibm.com/support/docview.wss?uid=swg21980826</a> External Reference: <a href="http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_April_2016">http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_April_2016</a>
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.7.0-ibm-1:1.7.0.9.40-1jpp.1.el5 | 1.7.0-ibm-1:1.7.0.9.40-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-1:1.6.0.16.25-1jpp.1.el5 | 1.6.0-ibm-1:1.6.0.16.25-1jpp.1.el5 |
redhat/java | <1.7.1-ibm-1:1.7.1.3.40-1jpp.1.el6_7 | 1.7.1-ibm-1:1.7.1.3.40-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-1:1.6.0.16.25-1jpp.1.el6_7 | 1.6.0-ibm-1:1.6.0.16.25-1jpp.1.el6_7 |
redhat/java | <1.8.0-ibm-1:1.8.0.3.0-1jpp.1.el6 | 1.8.0-ibm-1:1.8.0.3.0-1jpp.1.el6 |
redhat/java | <1.7.1-ibm-1:1.7.1.3.40-1jpp.1.el7 | 1.7.1-ibm-1:1.7.1.3.40-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-1:1.8.0.3.0-1jpp.1.el7 | 1.8.0-ibm-1:1.8.0.3.0-1jpp.1.el7 |
redhat/spacewalk-java | <0:2.0.2-109.el6 | 0:2.0.2-109.el6 |
redhat/java | <1.7.1-ibm-1:1.7.1.4.1-1jpp.1.el6_8 | 1.7.1-ibm-1:1.7.1.4.1-1jpp.1.el6_8 |
redhat/spacewalk-java | <0:2.3.8-146.el6 | 0:2.3.8-146.el6 |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp4 | |
Ibm Java Sdk | >=6.0.0.0<6.0.16.25 | |
Ibm Java Sdk | >=6.1.0.0<6.1.8.25 | |
Ibm Java Sdk | >=7.0.0.0<7.0.9.40 | |
Ibm Java Sdk | >=7.1.0.0<7.1.3.40 | |
Ibm Java Sdk | >=8.0.0.0<8.0.3.0 | |
Redhat Satellite | =5.6 | |
Redhat Satellite | =5.7 | |
Redhat Enterprise Linux Desktop | =5.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Hpc Node Supplementary | =6.0 | |
Redhat Enterprise Linux Hpc Node Supplementary | =7.0 | |
Redhat Enterprise Linux Server | =5.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Eus | =6.7 | |
Redhat Enterprise Linux Server Eus | =7.2 | |
Redhat Enterprise Linux Server Eus | =7.3 | |
Redhat Enterprise Linux Server Eus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Workstation | =5.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =12-sp1 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Software Development Kit | =12-sp1 | |
SUSE SUSE Linux Enterprise Server | =12 | |
SUSE Manager | =2.1 | |
Suse Manager Proxy | =2.1 | |
SUSE OpenStack Cloud | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)