First published: Mon Apr 23 2012(Updated: )
The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and<br>the IBM Java 2 Software Development Kit.<br>This update fixes several vulnerabilities in the IBM Java 2 Runtime<br>Environment and the IBM Java 2 Software Development Kit. Detailed<br>vulnerability descriptions are linked from the IBM "Security alerts" page,<br>listed in the References section. (CVE-2011-3389, CVE-2011-3557,<br>CVE-2011-3560, CVE-2011-3563, CVE-2012-0498, CVE-2012-0499, CVE-2012-0501,<br>CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507)<br>All users of java-1.5.0-ibm are advised to upgrade to these updated<br>packages, containing the IBM 1.5.0 SR13-FP1 Java release. All running<br>instances of IBM Java must be restarted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.5.0-ibm-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-demo-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-demo-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-devel-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-devel-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-devel-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-devel-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-javacomm-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-javacomm-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-src-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-src-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-demo-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-demo-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-javacomm-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-javacomm-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-jdbc-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-jdbc-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-plugin-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-plugin-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-src-1.5.0.13.1-1jpp.2.el6_2 | 1.5.0-ibm-src-1.5.0.13.1-1jpp.2.el6_2 |
redhat/java | <1.5.0-ibm-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-accessibility-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-accessibility-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-demo-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-demo-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-demo-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-demo-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-devel-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-devel-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-devel-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-devel-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-javacomm-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-javacomm-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-javacomm-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-javacomm-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-jdbc-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-jdbc-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-plugin-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-plugin-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-src-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-src-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-src-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-src-1.5.0.13.1-1jpp.1.el5 |
redhat/java | <1.5.0-ibm-accessibility-1.5.0.13.1-1jpp.1.el5 | 1.5.0-ibm-accessibility-1.5.0.13.1-1jpp.1.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2012:0508 resolves multiple security vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit.
To fix RHSA-2012:0508, update your installation of IBM Java to version 1.5.0-ibm-1.5.0.13.1-1jpp.2.el6_2 or the respective version for your package.
The severity level of RHSA-2012:0508 is classified as important, indicating a moderate threat to system security.
RHSA-2012:0508 affects several packages, including java, java-demo, java-devel, java-javacomm, and several others under IBM Java 1.5.0.
Yes, applying the update for RHSA-2012:0508 is necessary to mitigate security vulnerabilities and ensure the safety of your Java applications.