First published: Tue Feb 04 2014(Updated: )
IBM J2SE version 5.0 includes the IBM Java Runtime Environment and the IBM<br>Java Software Development Kit.<br>This update fixes several vulnerabilities in the IBM Java Runtime<br>Environment and the IBM Java Software Development Kit. Detailed<br>vulnerability descriptions are linked from the IBM Security alerts<br>page, listed in the References section. (CVE-2013-5907, CVE-2014-0368,<br>CVE-2014-0373, CVE-2014-0376, CVE-2014-0411, CVE-2014-0416, CVE-2014-0417,<br>CVE-2014-0422, CVE-2014-0423, CVE-2014-0428)<br>All users of java-1.5.0-ibm are advised to upgrade to these updated<br>packages, containing the IBM J2SE 5.0 SR16-FP5 release. All running<br>instances of IBM Java must be restarted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.5.0-ibm-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-demo-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-demo-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-devel-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-devel-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-devel-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-devel-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-javacomm-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-javacomm-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-src-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-src-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-demo-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-demo-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-javacomm-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-javacomm-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-jdbc-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-jdbc-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-plugin-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-plugin-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-src-1.5.0.16.5-1jpp.1.el6_5 | 1.5.0-ibm-src-1.5.0.16.5-1jpp.1.el6_5 |
redhat/java | <1.5.0-ibm-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-accessibility-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-accessibility-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-demo-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-demo-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-demo-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-demo-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-devel-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-devel-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-devel-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-devel-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-javacomm-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-javacomm-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-javacomm-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-javacomm-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-jdbc-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-jdbc-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-plugin-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-plugin-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-src-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-src-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-src-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-src-1.5.0.16.5-1jpp.1.el5_10 |
redhat/java | <1.5.0-ibm-accessibility-1.5.0.16.5-1jpp.1.el5_10 | 1.5.0-ibm-accessibility-1.5.0.16.5-1jpp.1.el5_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2014:0136 is categorized as important due to several vulnerabilities in the IBM Java Runtime Environment.
To resolve RHSA-2014:0136, update to the specified patched version of the IBM Java packages mentioned in the advisory.
RHSA-2014:0136 affects various versions of the IBM Java Runtime Environment, including 1.5.0-ibm up to 1.5.0-ibm-1.5.0.16.5-1jpp.1.el6_5.
Yes, affected packages include java, java-demo, java-devel, javacomm, jdbc, plugin, and src from the IBM Java environment.
Yes, organizations and users running the affected versions should apply the patches as soon as possible to mitigate the security risks.