vulnerability
RHSA-2016:0100: java-1.7.0-ibm security update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | 2016-01-21 | 2016-02-04 | 2025-02-18 |
Description
IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBMJava Software Development Kit.This update fixes several vulnerabilities in the IBM Java RuntimeEnvironment and the IBM Java Software Development Kit. Further informationabout these flaws can be found on the IBM Java Security alerts page, listedin the References section. (CVE-2015-5041, CVE-2015-7575, CVE-2015-7981,CVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0402, CVE-2016-0448,CVE-2016-0466, CVE-2016-0483, CVE-2016-0494)Note: This update also disallows the use of the MD5 hash algorithm in thecertification path processing. The use of MD5 can be re-enabled by removingMD5 from the jdk.certpath.disabledAlgorithms security property defined inthe java.security file.All users of java-1.7.0-ibm are advised to upgrade to these updatedpackages, containing the IBM Java SE 7 SR9-FP30 release. All runninginstances of IBM Java must be restarted for the update to take effect.
Solution(s)
References
- APPLE-APPLE-SA-2016-03-21-5
- BID-78624
- BID-80592
- CVE-2015-5041
- https://attackerkb.com/topics/CVE-2015-5041
- CVE-2015-7575
- https://attackerkb.com/topics/CVE-2015-7575
- CVE-2015-7981
- https://attackerkb.com/topics/CVE-2015-7981
- CVE-2015-8126
- https://attackerkb.com/topics/CVE-2015-8126
- CVE-2015-8472
- https://attackerkb.com/topics/CVE-2015-8472
- CVE-2015-8540
- https://attackerkb.com/topics/CVE-2015-8540
- CVE-2016-0402
- https://attackerkb.com/topics/CVE-2016-0402
- CVE-2016-0448
- https://attackerkb.com/topics/CVE-2016-0448
- CVE-2016-0466
- https://attackerkb.com/topics/CVE-2016-0466
- CVE-2016-0483
- https://attackerkb.com/topics/CVE-2016-0483
- CVE-2016-0494
- https://attackerkb.com/topics/CVE-2016-0494
- DEBIAN-DSA-3399
- REDHAT-RHSA-2015:2594
- REDHAT-RHSA-2015:2595
- REDHAT-RHSA-2015:2596
- REDHAT-RHSA-2016:0100

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.