First published: Mon Nov 07 2016(Updated: )
IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java<br>Software Development Kit.<br>This update upgrades IBM Java SE 6 to version 6 SR16-FP35.<br>Security Fix(es):<br><li> This update fixes multiple vulnerabilities in the IBM Java Runtime Environment</li> and the IBM Java Software Development Kit. Further information about these flaws<br>can be found on the IBM Java Security alerts page, listed in the References<br>section. (CVE-2016-5542, CVE-2016-5554, CVE-2016-5556, CVE-2016-5573,<br>CVE-2016-5597)<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.6.0-ibm-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-demo-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-demo-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-devel-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-devel-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-javacomm-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-jdbc-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-plugin-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-src-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-src-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-demo-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-demo-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-devel-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-devel-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-javacomm-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-jdbc-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-plugin-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-src-1.6.0.16.35-1jpp.1.el6_8 | 1.6.0-ibm-src-1.6.0.16.35-1jpp.1.el6_8 |
redhat/java | <1.6.0-ibm-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-accessibility-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-accessibility-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-demo-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-demo-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-demo-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-demo-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-devel-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-devel-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-devel-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-devel-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-javacomm-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-javacomm-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-javacomm-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-jdbc-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-jdbc-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-jdbc-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-plugin-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-plugin-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-plugin-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-src-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-src-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-src-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-src-1.6.0.16.35-1jpp.1.el5_11 |
redhat/java | <1.6.0-ibm-accessibility-1.6.0.16.35-1jpp.1.el5_11 | 1.6.0-ibm-accessibility-1.6.0.16.35-1jpp.1.el5_11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2016:2659 addresses multiple vulnerabilities in the IBM Java Runtime Environment.
The severity of RHSA-2016:2659 is considered moderate.
To fix RHSA-2016:2659, upgrade IBM Java SE version 6 to version 6 SR16-FP35 as noted in the advisory.
RHSA-2016:2659 affects IBM Java SE version 6 and its various variants.
Yes, upgrading to version 6 SR16-FP35 is necessary to mitigate the vulnerabilities outlined in RHSA-2016:2659.