Описание
ELSA-2009-1584: java-1.6.0-openjdk security update (IMPORTANT)
[1:1.6.0.0.0-1.7.b09.0.1.el5]
- Add oracle-enterprise.patch
[1:1.6.0-1.7.b09]
- Fixed applying patches
[1:1.6.0-1.6.b09]
- Updated Release
[1:1.6.0-1.5.b09]
- Fixed Makefile patch
[1:1.6.0-1.4.b09]
- Updated release tag
[1:1.6.0-1.3.b09]
- Updated release
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
java-1.6.0-openjdk
1.6.0.0-1.7.b09.0.1.el5
java-1.6.0-openjdk-demo
1.6.0.0-1.7.b09.0.1.el5
java-1.6.0-openjdk-devel
1.6.0.0-1.7.b09.0.1.el5
java-1.6.0-openjdk-javadoc
1.6.0.0-1.7.b09.0.1.el5
java-1.6.0-openjdk-src
1.6.0.0-1.7.b09.0.1.el5
Oracle Linux i386
java-1.6.0-openjdk
1.6.0.0-1.7.b09.0.1.el5
java-1.6.0-openjdk-demo
1.6.0.0-1.7.b09.0.1.el5
java-1.6.0-openjdk-devel
1.6.0.0-1.7.b09.0.1.el5
java-1.6.0-openjdk-javadoc
1.6.0.0-1.7.b09.0.1.el5
java-1.6.0-openjdk-src
1.6.0.0-1.7.b09.0.1.el5
Ссылки на источники
Связанные уязвимости
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
Integer overflow in the JPEGImageReader implementation in the ImageI/O ...
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.