{"id":"RHSA-2017:1216","summary":"Red Hat Security Advisory: java-1.7.1-ibm security update","modified":"2026-05-13T10:04:21Z","published":"2024-09-29T17:07:08Z","upstream":["CVE-2016-0264","CVE-2016-0363","CVE-2016-0376","CVE-2016-0686","CVE-2016-0687","CVE-2016-2183","CVE-2016-3422","CVE-2016-3426","CVE-2016-3427","CVE-2016-3443","CVE-2016-3449","CVE-2016-3511","CVE-2016-3598","CVE-2016-5542","CVE-2016-5546","CVE-2016-5547","CVE-2016-5548","CVE-2016-5549","CVE-2016-5552","CVE-2016-5554","CVE-2016-5556","CVE-2016-5573","CVE-2016-5597","CVE-2017-3231","CVE-2017-3241","CVE-2017-3252","CVE-2017-3253","CVE-2017-3259","CVE-2017-3261","CVE-2017-3272","CVE-2017-3289"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327743"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327749"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328059"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328210"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328618"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328619"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328620"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1330986"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331359"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1356971"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358168"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369383"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385544"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385714"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1385723"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386103"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1386408"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413554"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413562"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413583"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413653"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413717"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413764"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413882"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413906"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413911"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413920"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413923"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1413955"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1324044"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1414163"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1216.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0264"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0264"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0264"},{"type":"ARTICLE","url":"http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_April_2016"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0363"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0363"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0363"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0376"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0376"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0376"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0686"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0686"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0686"},{"type":"ARTICLE","url":"http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixJAVA"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0687"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0687"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0687"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-2183"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-2183"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2183"},{"type":"ARTICLE","url":"https://access.redhat.com/articles/2548661"},{"type":"ARTICLE","url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"type":"ARTICLE","url":"https://sweet32.info/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3422"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3422"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3422"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3426"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3426"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3426"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3427"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3427"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3427"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3443"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3443"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3443"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3449"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3449"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3449"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3511"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3511"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3511"},{"type":"ARTICLE","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3598"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3598"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3598"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5542"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5542"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5542"},{"type":"ARTICLE","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5546"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5546"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5546"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5547"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5547"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5547"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5548"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5548"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5548"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5549"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5549"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5549"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5552"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5552"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5552"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5554"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5554"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5554"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5556"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5556"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5556"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5573"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5573"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5573"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-5597"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-5597"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5597"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3231"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3231"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3231"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3241"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3241"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3241"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3252"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3252"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3252"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3253"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3253"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3253"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3259"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3259"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3259"},{"type":"ARTICLE","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3261"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3261"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3261"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3272"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3272"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3272"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-3289"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-3289"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3289"}],"affected":[{"package":{"name":"java-1.7.1-ibm","ecosystem":"Red Hat:network_satellite:5.6::el6","purl":"pkg:rpm/redhat/java-1.7.1-ibm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.7.1.4.1-1jpp.1.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1216.json"}},{"package":{"name":"java-1.7.1-ibm-devel","ecosystem":"Red Hat:network_satellite:5.6::el6","purl":"pkg:rpm/redhat/java-1.7.1-ibm-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.7.1.4.1-1jpp.1.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1216.json"}},{"package":{"name":"java-1.7.1-ibm","ecosystem":"Red Hat:network_satellite:5.7::el6","purl":"pkg:rpm/redhat/java-1.7.1-ibm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.7.1.4.1-1jpp.1.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1216.json"}},{"package":{"name":"java-1.7.1-ibm-devel","ecosystem":"Red Hat:network_satellite:5.7::el6","purl":"pkg:rpm/redhat/java-1.7.1-ibm-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.7.1.4.1-1jpp.1.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1216.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}