First published: Thu Jan 21 2016(Updated: )
Oracle Java SE version 6 includes the Oracle Java Runtime Environment and<br>the Oracle Java Software Development Kit.<br>This update fixes several vulnerabilities in the Oracle Java Runtime<br>Environment and the Oracle Java Software Development Kit. Further<br>information about these flaws can be found on the Oracle Java SE Critical<br>Patch Update Advisory page, listed in the References section.<br>(CVE-2015-8126, CVE-2015-8472, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466,<br>CVE-2016-0483, CVE-2016-0494)<br>Note: This update also disallows the use of the MD5 hash algorithm in the<br>certification path processing. The use of MD5 can be re-enabled by removing<br>MD5 from the jdk.certpath.disabledAlgorithms security property defined in<br>the java.security file.<br>All users of java-1.6.0-sun are advised to upgrade to these updated<br>packages, which provide Oracle Java 6 Update 111 and resolve these issues.<br>All running instances of Oracle Java must be restarted for the update to<br>take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Java | ||
Oracle Java | >=1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2016:0057 is classified as important.
To fix RHSA-2016:0057, update Oracle Java SE to the latest version available.
RHSA-2016:0057 addresses multiple vulnerabilities within Oracle Java SE that affect the runtime environment and software development kit.
RHSA-2016:0057 affects Oracle Java SE version 6.
At this time, there are no widely reported known issues associated with the fix for RHSA-2016:0057.