Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-1584

Опубликовано: 16 нояб. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-1584: java-1.6.0-openjdk security update (IMPORTANT)

[1:1.6.0.0.0-1.7.b09.0.1.el5]

  • Add oracle-enterprise.patch

[1:1.6.0-1.7.b09]

  • Fixed applying patches

[1:1.6.0-1.6.b09]

  • Updated Release

[1:1.6.0-1.5.b09]

  • Fixed Makefile patch

[1:1.6.0-1.4.b09]

  • Updated release tag

[1:1.6.0-1.3.b09]

  • Updated release

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

java-1.6.0-openjdk

1.6.0.0-1.7.b09.0.1.el5

java-1.6.0-openjdk-demo

1.6.0.0-1.7.b09.0.1.el5

java-1.6.0-openjdk-devel

1.6.0.0-1.7.b09.0.1.el5

java-1.6.0-openjdk-javadoc

1.6.0.0-1.7.b09.0.1.el5

java-1.6.0-openjdk-src

1.6.0.0-1.7.b09.0.1.el5

Oracle Linux i386

java-1.6.0-openjdk

1.6.0.0-1.7.b09.0.1.el5

java-1.6.0-openjdk-demo

1.6.0.0-1.7.b09.0.1.el5

java-1.6.0-openjdk-devel

1.6.0.0-1.7.b09.0.1.el5

java-1.6.0-openjdk-javadoc

1.6.0.0-1.7.b09.0.1.el5

java-1.6.0-openjdk-src

1.6.0.0-1.7.b09.0.1.el5

Связанные уязвимости

ubuntu
больше 15 лет назад

Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.

redhat
больше 15 лет назад

Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.

nvd
больше 15 лет назад

Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.

debian
больше 15 лет назад

Integer overflow in the JPEGImageReader implementation in the ImageI/O ...

github
около 3 лет назад

Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.