First published: Tue Feb 04 2014(Updated: )
IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM<br>Java Software Development Kit.<br>This update fixes several vulnerabilities in the IBM Java Runtime<br>Environment and the IBM Java Software Development Kit. Detailed<br>vulnerability descriptions are linked from the IBM Security alerts<br>page, listed in the References section. (CVE-2013-5878, CVE-2013-5884,<br>CVE-2013-5887, CVE-2013-5888, CVE-2013-5889, CVE-2013-5896, CVE-2013-5898,<br>CVE-2013-5899, CVE-2013-5907, CVE-2013-5910, CVE-2014-0368, CVE-2014-0373,<br>CVE-2014-0375, CVE-2014-0376, CVE-2014-0387, CVE-2014-0403, CVE-2014-0410,<br>CVE-2014-0411, CVE-2014-0415, CVE-2014-0416, CVE-2014-0417, CVE-2014-0422,<br>CVE-2014-0423, CVE-2014-0424, CVE-2014-0428)<br>All users of java-1.6.0-ibm are advised to upgrade to these updated<br>packages, containing the IBM Java SE 6 SR15-FP1 release. All running<br>instances of IBM Java must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.6.0-ibm-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-demo-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-demo-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-devel-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-devel-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-devel-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-devel-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-javacomm-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-jdbc-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-plugin-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-src-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-src-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-demo-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-demo-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-javacomm-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-jdbc-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-plugin-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-src-1.6.0.15.1-1jpp.1.el6_5 | 1.6.0-ibm-src-1.6.0.15.1-1jpp.1.el6_5 |
redhat/java | <1.6.0-ibm-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-accessibility-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-accessibility-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-demo-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-demo-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-demo-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-demo-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-devel-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-devel-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-devel-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-devel-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-javacomm-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-javacomm-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-jdbc-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-jdbc-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-plugin-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-plugin-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-src-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-src-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-src-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-src-1.6.0.15.1-1jpp.1.el5_10 |
redhat/java | <1.6.0-ibm-accessibility-1.6.0.15.1-1jpp.1.el5_10 | 1.6.0-ibm-accessibility-1.6.0.15.1-1jpp.1.el5_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.