Описание
ELSA-2009-1201: java-1.6.0-openjdk security and bug fix update (IMPORTANT)
[1:1.6.0.0-1.2.b09.0.1.el5]
- Add oracle-enterprise.patch
[1:1.6.0.0-1.2.b09]
- Updated release.
- Moved java-1.6.0-openjdk-securitypatches.patch to java-1.6.0-openjdk-march24-securitypatches.patch.
- Created new java-1.6.0-openjdk-july28-securitypatches.patch.
- Updated release.
- Resolves: rhbz#513391
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
java-1.6.0-openjdk
1.6.0.0-1.2.b09.0.1.el5
java-1.6.0-openjdk-demo
1.6.0.0-1.2.b09.0.1.el5
java-1.6.0-openjdk-devel
1.6.0.0-1.2.b09.0.1.el5
java-1.6.0-openjdk-javadoc
1.6.0.0-1.2.b09.0.1.el5
java-1.6.0-openjdk-src
1.6.0.0-1.2.b09.0.1.el5
Oracle Linux i386
java-1.6.0-openjdk
1.6.0.0-1.2.b09.0.1.el5
java-1.6.0-openjdk-demo
1.6.0.0-1.2.b09.0.1.el5
java-1.6.0-openjdk-devel
1.6.0.0-1.2.b09.0.1.el5
java-1.6.0-openjdk-javadoc
1.6.0.0-1.2.b09.0.1.el5
java-1.6.0-openjdk-src
1.6.0.0-1.2.b09.0.1.el5
Ссылки на источники
Связанные уязвимости
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
The Java Management Extensions (JMX) implementation in Sun Java SE 6 b ...
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.