Rapid7 Vulnerability & Exploit Database

RHSA-2011:0357: java-1.6.0-ibm security update

Back to Search

RHSA-2011:0357: java-1.6.0-ibm security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
02/17/2011
Created
07/25/2018
Added
04/01/2011
Modified
07/04/2017

Description

The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment andthe IBM Java 2 Software Development Kit.This update fixes several vulnerabilities in the IBM Java 2 RuntimeEnvironment and the IBM Java 2 Software Development Kit. Detailedvulnerability descriptions are linked from the IBM "Security alerts" page,listed in the References section. (CVE-2010-4422, CVE-2010-4447,CVE-2010-4448, CVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463,CVE-2010-4465, CVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4471,CVE-2010-4473, CVE-2010-4475)Note: The RHSA-2010:0987 and RHSA-2011:0290 java-1.6.0-ibm errata weremissing 64-bit PowerPC packages for Red Hat Enterprise Linux 4 Extras. Thiserratum provides 64-bit PowerPC packages for Red Hat Enterprise Linux 4Extras as expected.All users of java-1.6.0-ibm are advised to upgrade to these updatedpackages, containing the IBM 1.6.0 SR9-FP1 Java release. All runninginstances of IBM Java must be restarted for the update to take effect.

Solution(s)

  • redhat-upgrade-java-1-6-0-ibm
  • redhat-upgrade-java-1-6-0-ibm-accessibility
  • redhat-upgrade-java-1-6-0-ibm-demo
  • redhat-upgrade-java-1-6-0-ibm-devel
  • redhat-upgrade-java-1-6-0-ibm-javacomm
  • redhat-upgrade-java-1-6-0-ibm-jdbc
  • redhat-upgrade-java-1-6-0-ibm-plugin
  • redhat-upgrade-java-1-6-0-ibm-src

References

  • redhat-upgrade-java-1-6-0-ibm
  • redhat-upgrade-java-1-6-0-ibm-accessibility
  • redhat-upgrade-java-1-6-0-ibm-demo
  • redhat-upgrade-java-1-6-0-ibm-devel
  • redhat-upgrade-java-1-6-0-ibm-javacomm
  • redhat-upgrade-java-1-6-0-ibm-jdbc
  • redhat-upgrade-java-1-6-0-ibm-plugin
  • redhat-upgrade-java-1-6-0-ibm-src

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;