rhsa-2015_1604
Vulnerability from csaf_redhat
Published
2015-08-12 16:38
Modified
2024-11-05 18:59
Summary
Red Hat Security Advisory: Red Hat Satellite IBM Java Runtime security update
Notes
Topic
Updated java-1.6.0-ibm packages that fix several security issues are now
available for Red Hat Satellite 5.6 and 5.7.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM
Java Software Development Kit.
This update fixes several vulnerabilities in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Further information
about these flaws can be found on the IBM Java Security alerts page, listed
in the References section. (CVE-2015-1931, CVE-2015-2590, CVE-2015-2601,
CVE-2015-2621, CVE-2015-2625, CVE-2015-2632, CVE-2015-2637, CVE-2015-2638,
CVE-2015-2664, CVE-2015-4000, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733,
CVE-2015-4748, CVE-2015-4749, CVE-2015-4760)
Note: This update forces the TLS/SSL client implementation in IBM JDK to
reject DH key sizes below 768 bits to address the CVE-2015-4000 issue.
Refer to Red Hat Bugzilla bug 1223211, linked to in the References section,
for additional details about this change.
Users of Red Hat Satellite 5.6 and 5.7 are advised to upgrade to these
updated packages, which contain the IBM Java SE 6 SR16-FP7 release. For
this update to take effect, Red Hat Satellite must be restarted
("/usr/sbin/rhn-satellite restart"), as well as all running instances of
IBM Java.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Satellite 5.6 and 5.7.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM\nJava Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java Runtime\nEnvironment and the IBM Java Software Development Kit. Further information\nabout these flaws can be found on the IBM Java Security alerts page, listed\nin the References section. (CVE-2015-1931, CVE-2015-2590, CVE-2015-2601,\nCVE-2015-2621, CVE-2015-2625, CVE-2015-2632, CVE-2015-2637, CVE-2015-2638,\nCVE-2015-2664, CVE-2015-4000, CVE-2015-4731, CVE-2015-4732, CVE-2015-4733,\nCVE-2015-4748, CVE-2015-4749, CVE-2015-4760)\n\nNote: This update forces the TLS/SSL client implementation in IBM JDK to\nreject DH key sizes below 768 bits to address the CVE-2015-4000 issue.\nRefer to Red Hat Bugzilla bug 1223211, linked to in the References section,\nfor additional details about this change.\n\nUsers of Red Hat Satellite 5.6 and 5.7 are advised to upgrade to these\nupdated packages, which contain the IBM Java SE 6 SR16-FP7 release. For\nthis update to take effect, Red Hat Satellite must be restarted\n(\"/usr/sbin/rhn-satellite restart\"), as well as all running instances of\nIBM Java.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1604", "url": "https://access.redhat.com/errata/RHSA-2015:1604" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1223211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211" }, { "category": "external", "summary": "1241965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241965" }, { "category": "external", "summary": "1242019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242019" }, { "category": "external", "summary": "1242234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242234" }, { "category": "external", "summary": "1242240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242240" }, { "category": "external", "summary": "1242275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242275" }, { "category": "external", "summary": "1242281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242281" }, { "category": "external", "summary": "1242372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242372" }, { "category": "external", "summary": "1242379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242379" }, { "category": "external", "summary": "1242394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242394" }, { "category": "external", "summary": "1242447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242447" }, { "category": "external", "summary": "1243139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243139" }, { "category": "external", "summary": "1243283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243283" }, { "category": "external", "summary": "1243287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243287" }, { "category": "external", "summary": "1243300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243300" }, { "category": "external", "summary": "1244828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1244828" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1604.json" } ], "title": "Red Hat Security Advisory: Red Hat Satellite IBM Java Runtime security update", "tracking": { "current_release_date": "2024-11-05T18:59:40+00:00", "generator": { "date": "2024-11-05T18:59:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2015:1604", "initial_release_date": "2015-08-12T16:38:58+00:00", "revision_history": [ { "date": "2015-08-12T16:38:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-08-12T16:38:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:59:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.7::el6" } } }, { "category": "product_name", "name": "Red Hat Satellite 5.6 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.6 (RHEL v.6)", "product_id": "6Server-Satellite56", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.6::el6" } } }, { "category": "product_name", "name": "Red Hat Satellite 5.6 (RHEL v.5)", "product": { "name": "Red Hat Satellite 5.6 (RHEL v.5)", "product_id": "5Server-Satellite56", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.6::el5" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.16.7-1jpp.1.el6_7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.16.7-1jpp.1.el6_7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.16.7-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.16.7-1jpp.1.el5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.16.7-1jpp.1.el6_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.16.7-1jpp.1.el6_7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.16.7-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.16.7-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "product_id": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.16.7-1jpp.1.el6_7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "product_id": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.16.7-1jpp.1.el5?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x as a component of Red Hat Satellite 5.6 (RHEL v.5)", "product_id": "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Satellite56" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src as a component of Red Hat Satellite 5.6 (RHEL v.5)", "product_id": "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "relates_to_product_reference": "5Server-Satellite56" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64 as a component of Red Hat Satellite 5.6 (RHEL v.5)", "product_id": "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Satellite56" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x as a component of Red Hat Satellite 5.6 (RHEL v.5)", "product_id": "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Satellite56" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64 as a component of Red Hat Satellite 5.6 (RHEL v.5)", "product_id": "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Satellite56" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x as a component of Red Hat Satellite 5.6 (RHEL v.6)", "product_id": "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "relates_to_product_reference": "6Server-Satellite56" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src as a component of Red Hat Satellite 5.6 (RHEL v.6)", "product_id": "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "relates_to_product_reference": "6Server-Satellite56" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64 as a component of Red Hat Satellite 5.6 (RHEL v.6)", "product_id": "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "relates_to_product_reference": "6Server-Satellite56" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x as a component of Red Hat Satellite 5.6 (RHEL v.6)", "product_id": "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "relates_to_product_reference": "6Server-Satellite56" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64 as a component of Red Hat Satellite 5.6 (RHEL v.6)", "product_id": "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "relates_to_product_reference": "6Server-Satellite56" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64 as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "relates_to_product_reference": "6Server-Satellite57" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64 as a component of Red Hat Satellite 5.7 (RHEL v.6)", "product_id": "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "relates_to_product_reference": "6Server-Satellite57" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1931", "discovery_date": "2015-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1244828" } ], "notes": [ { "category": "description", "text": "IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores plaintext information in memory dumps, which allows local users to obtain sensitive information by reading a file.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: plain text data stored in memory dumps", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1931" }, { "category": "external", "summary": "RHBZ#1244828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1244828" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1931", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1931" } ], "release_date": "2015-07-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: plain text data stored in memory dumps" }, { "cve": "CVE-2015-2590", "discovery_date": "2015-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1243139" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-2590" }, { "category": "external", "summary": "RHBZ#1243139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-2590", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2590" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-2590", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2590" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)" }, { "cve": "CVE-2015-2601", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2015-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1242019" } ], "notes": [ { "category": "description", "text": "It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-2601" }, { "category": "external", "summary": "RHBZ#1242019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-2601", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2601" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-2601", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2601" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865)" }, { "cve": "CVE-2015-2621", "discovery_date": "2015-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1242372" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the JMX component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-2621" }, { "category": "external", "summary": "RHBZ#1242372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-2621", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-2621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2621" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853)" }, { "cve": "CVE-2015-2625", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2014-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1241965" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-2625" }, { "category": "external", "summary": "RHBZ#1241965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241965" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2625" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2014-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694)" }, { "cve": "CVE-2015-2632", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2015-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1242394" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the 2D component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-2632" }, { "category": "external", "summary": "RHBZ#1242394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-2632", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-2632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2632" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520)" }, { "cve": "CVE-2015-2637", "discovery_date": "2015-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1243287" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-2637" }, { "category": "external", "summary": "RHBZ#1243287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243287" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-2637", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2637" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-2637", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2637" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D)" }, { "cve": "CVE-2015-2638", "discovery_date": "2015-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1243283" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-2638" }, { "category": "external", "summary": "RHBZ#1243283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243283" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-2638", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2638" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-2638", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2638" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D)" }, { "cve": "CVE-2015-2664", "discovery_date": "2015-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1243300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-2664" }, { "category": "external", "summary": "RHBZ#1243300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-2664", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-2664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2664" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment)" }, { "cve": "CVE-2015-4000", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2015-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1223211" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the TLS protocol composes the Diffie-Hellman exchange (for both export and non-export grade cipher suites). An attacker could use this flaw to downgrade a DHE connection to use export-grade key sizes, which could then be broken by sufficient pre-computation. This can lead to a passive man-in-the-middle attack in which the attacker is able to decrypt all traffic.", "title": "Vulnerability description" }, { "category": "summary", "text": "LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of openssl and nss libraries as shipped with Red Hat Enterprise Linux 4, 5, 6 and 7. More information about this flaw is available at: https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c4 and https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c5.\n\nRed Hat Enterprise Linux 4 is in Extended Life Cycle phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 4.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-4000" }, { "category": "external", "summary": "RHBZ#1223211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-4000", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4000" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000" }, { "category": "external", "summary": "https://access.redhat.com/articles/1456263", "url": "https://access.redhat.com/articles/1456263" }, { "category": "external", "summary": "https://weakdh.org/", "url": "https://weakdh.org/" } ], "release_date": "2015-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks" }, { "cve": "CVE-2015-4731", "discovery_date": "2015-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1242234" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-4731" }, { "category": "external", "summary": "RHBZ#1242234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242234" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-4731", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-4731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4731" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397)" }, { "cve": "CVE-2015-4732", "cwe": { "id": "CWE-567", "name": "Unsynchronized Access to Shared Data in a Multithreaded Context" }, "discovery_date": "2015-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1242240" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-4732" }, { "category": "external", "summary": "RHBZ#1242240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-4732", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-4732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4732" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405)" }, { "cve": "CVE-2015-4733", "discovery_date": "2015-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1242275" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-4733" }, { "category": "external", "summary": "RHBZ#1242275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-4733", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4733" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-4733", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4733" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409)" }, { "cve": "CVE-2015-4748", "cwe": { "id": "CWE-299", "name": "Improper Check for Certificate Revocation" }, "discovery_date": "2015-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1242281" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-4748" }, { "category": "external", "summary": "RHBZ#1242281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242281" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-4748", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-4748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4748" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374)" }, { "cve": "CVE-2015-4749", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2015-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1242379" } ], "notes": [ { "category": "description", "text": "It was discovered that the JNDI component in OpenJDK did not handle DNS resolution errors correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-4749" }, { "category": "external", "summary": "RHBZ#1242379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-4749", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-4749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4749" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378)" }, { "cve": "CVE-2015-4760", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2015-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1242447" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-4760" }, { "category": "external", "summary": "RHBZ#1242447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1242447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-4760", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4760" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-4760", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4760" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA" } ], "release_date": "2015-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-08-12T16:38:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1604" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.src", "5Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el5.x86_64", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.s390x", "5Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el5.x86_64", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite56:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite56:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.src", "6Server-Satellite57:java-1.6.0-ibm-1:1.6.0.16.7-1jpp.1.el6_7.x86_64", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.s390x", "6Server-Satellite57:java-1.6.0-ibm-devel-1:1.6.0.16.7-1jpp.1.el6_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.