{"id":814,"date":"2015-03-07T09:31:41","date_gmt":"2015-03-07T08:31:41","guid":{"rendered":"http:\/\/ponte.ch\/blog\/?p=814"},"modified":"2015-03-07T09:31:41","modified_gmt":"2015-03-07T08:31:41","slug":"ibm-notesdomino-security-bulletin-vulnerabilities-in-the-ibm-java-sdk","status":"publish","type":"post","link":"https:\/\/ponte.ch\/blog\/ibm-notesdomino-security-bulletin-vulnerabilities-in-the-ibm-java-sdk\/","title":{"rendered":"IBM Notes\/Domino Security Bulletin: Vulnerabilities in the IBM Java SDK"},"content":{"rendered":"<p>Fresh from the press: new downloads\u00a0available for IBM Notes and IBM Domino to fix the Java issues\u00a0disclosed in the Oracle January 2015 Critical Patch Update.<\/p>\n<p>This Java vulnerabilities affect all current versions of IBM Notes and Domino\u00a0and if you don&#8217;t control some of the Java behaviour on the server or client via restrictions or ECL you should get these Java patches.<\/p>\n<p>Direct links to patches for 9.0.1 FP3:<br \/>\nWindows<br \/>\n<a href=\"http:\/\/www.ibm.com\/support\/fixcentral\/swg\/selectFix?product=ibm%2FLotus%2FLotus+Domino&amp;fixids=JVMPatch_SR16FP3_W32_901.3_ClientServer&amp;function=fixId&amp;parent=ibm\/Lotus\" target=\"_blank\">JVMPatch_SR16FP3_W32_901.3_ClientServer<br \/>\n<\/a><a href=\"http:\/\/www.ibm.com\/support\/fixcentral\/swg\/selectFix?product=ibm%2FLotus%2FLotus+Domino&amp;fixids=JVMPatch_SR16FP3_W64_901.3_Server&amp;function=fixId&amp;parent=ibm\/Lotus\" target=\"_blank\">JVMPatch_SR16FP3_W64_901.3_Server<\/a><\/p>\n<p>Linux<br \/>\n<a href=\"http:\/\/www.ibm.com\/support\/fixcentral\/swg\/selectFix?product=ibm%2FLotus%2FLotus+Domino&amp;fixids=JVMPatch_SR16FP3_Linux64_901.3_Server&amp;function=fixId&amp;parent=ibm\/Lotus\" target=\"_blank\">JVMPatch_SR16FP3_Linux64_901.3_Server<br \/>\n<\/a><a href=\"http:\/\/www.ibm.com\/support\/fixcentral\/swg\/selectFix?product=ibm%2FLotus%2FLotus+Domino&amp;fixids=JVMPatch_SR16FP3_Linux_901.3_ClientServer&amp;function=fixId&amp;parent=ibm\/Lotus\" target=\"_blank\">JVMPatch_SR16FP3_Linux_901.3_ClientServer<\/a><\/p>\n<p>Get more information and direct download links to all the patches\u00a0<a title=\"IBM Security Bulletin\" href=\"http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg21698222&amp;myns=swglotus&amp;mynp=OCSSKTWP&amp;mynp=OCSSKTMJ&amp;mync=E&amp;cm_sp=swglotus-_-OCSSKTWP-OCSSKTMJ-_-E\" target=\"_blank\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fresh from the press: new downloads\u00a0available for IBM Notes and IBM Domino to fix the Java issues\u00a0disclosed in the Oracle January 2015 Critical Patch Update. This Java vulnerabilities affect all current versions of IBM Notes and Domino\u00a0and if you don&#8217;t control some of the Java behaviour on the server or client via restrictions or ECL&#8230; <a class=\"more-link\" href=\"https:\/\/ponte.ch\/blog\/ibm-notesdomino-security-bulletin-vulnerabilities-in-the-ibm-java-sdk\/#more-814\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3,38,22],"tags":[96,95,117,99],"class_list":["post-814","post","type-post","status-publish","format-standard","hentry","category-domino","category-ibm","category-technology","tag-ibm-domino","tag-ibm-notes","tag-java","tag-security","clear"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2HetC-d8","_links":{"self":[{"href":"https:\/\/ponte.ch\/blog\/wp-json\/wp\/v2\/posts\/814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ponte.ch\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ponte.ch\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ponte.ch\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ponte.ch\/blog\/wp-json\/wp\/v2\/comments?post=814"}],"version-history":[{"count":3,"href":"https:\/\/ponte.ch\/blog\/wp-json\/wp\/v2\/posts\/814\/revisions"}],"predecessor-version":[{"id":860,"href":"https:\/\/ponte.ch\/blog\/wp-json\/wp\/v2\/posts\/814\/revisions\/860"}],"wp:attachment":[{"href":"https:\/\/ponte.ch\/blog\/wp-json\/wp\/v2\/media?parent=814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ponte.ch\/blog\/wp-json\/wp\/v2\/categories?post=814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ponte.ch\/blog\/wp-json\/wp\/v2\/tags?post=814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}