First published: Tue Feb 02 2016(Updated: )
IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM<br>Java Software Development Kit.<br>This update fixes several vulnerabilities in the IBM Java Runtime<br>Environment and the IBM Java Software Development Kit. Further information<br>about these flaws can be found on the IBM Java Security alerts page, listed<br>in the References section. (CVE-2015-5041, CVE-2015-7575, CVE-2015-7981,<br>CVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0402, CVE-2016-0448,<br>CVE-2016-0466, CVE-2016-0483, CVE-2016-0494)<br>Note: This update also disallows the use of the MD5 hash algorithm in the<br>certification path processing. The use of MD5 can be re-enabled by removing<br>MD5 from the jdk.certpath.disabledAlgorithms security property defined in<br>the java.security file.<br>All users of java-1.6.0-ibm are advised to upgrade to these updated<br>packages, containing the IBM Java SE 6 SR16-FP20 release. All running<br>instances of IBM Java must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.6.0-ibm-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-demo-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-demo-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-devel-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-devel-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-javacomm-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-jdbc-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-plugin-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-src-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-src-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-demo-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-demo-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-devel-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-devel-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-javacomm-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-jdbc-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-plugin-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-src-1.6.0.16.20-1jpp.1.el6_7 | 1.6.0-ibm-src-1.6.0.16.20-1jpp.1.el6_7 |
redhat/java | <1.6.0-ibm-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-accessibility-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-accessibility-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-demo-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-demo-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-demo-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-demo-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-devel-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-devel-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-devel-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-devel-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-javacomm-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-javacomm-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-jdbc-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-jdbc-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-plugin-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-plugin-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-src-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-src-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-src-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-src-1.6.0.16.20-1jpp.1.el5 |
redhat/java | <1.6.0-ibm-accessibility-1.6.0.16.20-1jpp.1.el5 | 1.6.0-ibm-accessibility-1.6.0.16.20-1jpp.1.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.