Описание
ELSA-2011-0214: java-1.6.0-openjdk security update (MODERATE)
[1.6.0.0-1.36.b17]
- removed plugin. How it comes in?!
- Resolves: rhbz#676295
[1.6.0.0-1.33.b17]
- bumped release number, it was accidentaly reduced, and now lower version then last one was released.
- Resolves: rhbz#676295
[1.6.0.0-1.22.b17]
- Updated to 1.7.9 tarball
- removed patch6, fixed upstrream
- Resolves: rhbz#676295
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
java-1.6.0-openjdk
1.6.0.0-1.18.b17.0.1.el5
java-1.6.0-openjdk-demo
1.6.0.0-1.18.b17.0.1.el5
java-1.6.0-openjdk-devel
1.6.0.0-1.18.b17.0.1.el5
java-1.6.0-openjdk-javadoc
1.6.0.0-1.18.b17.0.1.el5
java-1.6.0-openjdk-src
1.6.0.0-1.18.b17.0.1.el5
Oracle Linux i386
java-1.6.0-openjdk
1.6.0.0-1.18.b17.0.1.el5
java-1.6.0-openjdk-demo
1.6.0.0-1.18.b17.0.1.el5
java-1.6.0-openjdk-devel
1.6.0.0-1.18.b17.0.1.el5
java-1.6.0-openjdk-javadoc
1.6.0.0-1.18.b17.0.1.el5
java-1.6.0-openjdk-src
1.6.0.0-1.18.b17.0.1.el5
Oracle Linux 6
Oracle Linux x86_64
java-1.6.0-openjdk
1.6.0.0-1.36.b17.el6_0
java-1.6.0-openjdk-demo
1.6.0.0-1.36.b17.el6_0
java-1.6.0-openjdk-devel
1.6.0.0-1.36.b17.el6_0
java-1.6.0-openjdk-javadoc
1.6.0.0-1.36.b17.el6_0
java-1.6.0-openjdk-src
1.6.0.0-1.36.b17.el6_0
Oracle Linux i686
java-1.6.0-openjdk
1.6.0.0-1.36.b17.el6_0
java-1.6.0-openjdk-demo
1.6.0.0-1.36.b17.el6_0
java-1.6.0-openjdk-devel
1.6.0.0-1.36.b17.el6_0
java-1.6.0-openjdk-javadoc
1.6.0.0-1.36.b17.el6_0
java-1.6.0-openjdk-src
1.6.0.0-1.36.b17.el6_0
Связанные CVE
Связанные уязвимости
The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
The Double.parseDouble method in Java Runtime Environment (JRE) in Ora ...
Apache Tomcat affected by infinite loop in Double.parseDouble method in Java Runtime Environment