ID CVE-2016-10165
Summary The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.
References
Vulnerable Configurations
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.07:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.07:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.08:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.08:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.09:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.09:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.10:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.11:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.12:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.12:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.13:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.13:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.14:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.14:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.15:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.15:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.16:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.16:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.17:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.17:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.18:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.18:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:1.19:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:1.19:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:2.4:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:2.6:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:2.7:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:2.8:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:littlecms:little_cms_color_engine:2.9:*:*:*:*:*:*:*
    cpe:2.3:a:littlecms:little_cms_color_engine:2.9:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vmware_sra:*:*
    cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vmware_sra:*:*
  • cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vmware_vasa:*:*
    cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vmware_vasa:*:*
  • cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
    cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
  • cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
    cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
  • cpe:2.3:a:netapp:active_iq_unified_manager:7.3:*:*:*:*:windows:*:*
    cpe:2.3:a:netapp:active_iq_unified_manager:7.3:*:*:*:*:windows:*:*
  • cpe:2.3:a:netapp:active_iq_unified_manager:9.5:*:*:*:*:vmware_vsphere:*:*
    cpe:2.3:a:netapp:active_iq_unified_manager:9.5:*:*:*:*:vmware_vsphere:*:*
  • cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
    cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
  • cpe:2.3:a:netapp:active_iq_unified_manager:9.10:-:*:*:*:vmware_vsphere:*:*
    cpe:2.3:a:netapp:active_iq_unified_manager:9.10:-:*:*:*:vmware_vsphere:*:*
  • cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
    cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*
  • cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vmware_vcenter:*:*
    cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vmware_vcenter:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:p1:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:oncommand_unified_manager:7.1:*:*:*:*:vmware_vsphere:*:*
    cpe:2.3:a:netapp:oncommand_unified_manager:7.1:*:*:*:*:vmware_vsphere:*:*
CVSS
Base: 5.8 (as of 10-01-2024 - 18:26)
Impact:
Exploitability:
CWE CWE-125
CAPEC
  • Infiltration of Hardware Development Environment
    An attacker, leveraging the ability to manipulate components of primary support systems and tools within the development and production environments, inserts malicious software within the hardware and/or firmware development environment. The infiltration purpose is to alter developed hardware components in a system destined for deployment at the victim's organization, for the purpose of disruption or further compromise.
  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:N/A:P
redhat via4
advisories
  • rhsa
    id RHSA-2016:2079
  • rhsa
    id RHSA-2016:2658
  • rhsa
    id RHSA-2017:2999
  • rhsa
    id RHSA-2017:3046
  • rhsa
    id RHSA-2017:3264
  • rhsa
    id RHSA-2017:3267
  • rhsa
    id RHSA-2017:3268
  • rhsa
    id RHSA-2017:3453
rpms
  • java-1.8.0-openjdk-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-accessibility-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-accessibility-debug-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-debug-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-debug-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-debuginfo-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-debuginfo-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-demo-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-demo-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-demo-debug-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-demo-debug-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-devel-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-devel-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-devel-debug-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-devel-debug-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-headless-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-headless-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-headless-debug-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-headless-debug-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-javadoc-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-javadoc-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-javadoc-debug-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-javadoc-debug-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-src-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-src-1:1.8.0.111-1.b15.el7_2
  • java-1.8.0-openjdk-src-debug-1:1.8.0.111-0.b15.el6_8
  • java-1.8.0-openjdk-src-debug-1:1.8.0.111-1.b15.el7_2
  • java-1.7.0-openjdk-1:1.7.0.121-2.6.8.0.el7_3
  • java-1.7.0-openjdk-1:1.7.0.121-2.6.8.1.el5_11
  • java-1.7.0-openjdk-1:1.7.0.121-2.6.8.1.el6_8
  • java-1.7.0-openjdk-accessibility-1:1.7.0.121-2.6.8.0.el7_3
  • java-1.7.0-openjdk-debuginfo-1:1.7.0.121-2.6.8.0.el7_3
  • java-1.7.0-openjdk-debuginfo-1:1.7.0.121-2.6.8.1.el5_11
  • java-1.7.0-openjdk-debuginfo-1:1.7.0.121-2.6.8.1.el6_8
  • java-1.7.0-openjdk-demo-1:1.7.0.121-2.6.8.0.el7_3
  • java-1.7.0-openjdk-demo-1:1.7.0.121-2.6.8.1.el5_11
  • java-1.7.0-openjdk-demo-1:1.7.0.121-2.6.8.1.el6_8
  • java-1.7.0-openjdk-devel-1:1.7.0.121-2.6.8.0.el7_3
  • java-1.7.0-openjdk-devel-1:1.7.0.121-2.6.8.1.el5_11
  • java-1.7.0-openjdk-devel-1:1.7.0.121-2.6.8.1.el6_8
  • java-1.7.0-openjdk-headless-1:1.7.0.121-2.6.8.0.el7_3
  • java-1.7.0-openjdk-javadoc-1:1.7.0.121-2.6.8.0.el7_3
  • java-1.7.0-openjdk-javadoc-1:1.7.0.121-2.6.8.1.el5_11
  • java-1.7.0-openjdk-javadoc-1:1.7.0.121-2.6.8.1.el6_8
  • java-1.7.0-openjdk-src-1:1.7.0.121-2.6.8.0.el7_3
  • java-1.7.0-openjdk-src-1:1.7.0.121-2.6.8.1.el5_11
  • java-1.7.0-openjdk-src-1:1.7.0.121-2.6.8.1.el6_8
  • java-1.8.0-oracle-1:1.8.0.151-1jpp.1.el6
  • java-1.8.0-oracle-1:1.8.0.151-1jpp.5.el7
  • java-1.8.0-oracle-devel-1:1.8.0.151-1jpp.1.el6
  • java-1.8.0-oracle-devel-1:1.8.0.151-1jpp.5.el7
  • java-1.8.0-oracle-javafx-1:1.8.0.151-1jpp.1.el6
  • java-1.8.0-oracle-javafx-1:1.8.0.151-1jpp.5.el7
  • java-1.8.0-oracle-jdbc-1:1.8.0.151-1jpp.1.el6
  • java-1.8.0-oracle-jdbc-1:1.8.0.151-1jpp.5.el7
  • java-1.8.0-oracle-plugin-1:1.8.0.151-1jpp.1.el6
  • java-1.8.0-oracle-plugin-1:1.8.0.151-1jpp.5.el7
  • java-1.8.0-oracle-src-1:1.8.0.151-1jpp.1.el6
  • java-1.8.0-oracle-src-1:1.8.0.151-1jpp.5.el7
  • java-1.7.0-oracle-1:1.7.0.161-1jpp.3.el6
  • java-1.7.0-oracle-1:1.7.0.161-1jpp.4.el7
  • java-1.7.0-oracle-devel-1:1.7.0.161-1jpp.3.el6
  • java-1.7.0-oracle-devel-1:1.7.0.161-1jpp.4.el7
  • java-1.7.0-oracle-javafx-1:1.7.0.161-1jpp.3.el6
  • java-1.7.0-oracle-javafx-1:1.7.0.161-1jpp.4.el7
  • java-1.7.0-oracle-jdbc-1:1.7.0.161-1jpp.3.el6
  • java-1.7.0-oracle-jdbc-1:1.7.0.161-1jpp.4.el7
  • java-1.7.0-oracle-plugin-1:1.7.0.161-1jpp.3.el6
  • java-1.7.0-oracle-plugin-1:1.7.0.161-1jpp.4.el7
  • java-1.7.0-oracle-src-1:1.7.0.161-1jpp.3.el6
  • java-1.7.0-oracle-src-1:1.7.0.161-1jpp.4.el7
  • java-1.8.0-ibm-1:1.8.0.5.5-1jpp.2.el7
  • java-1.8.0-ibm-demo-1:1.8.0.5.5-1jpp.2.el7
  • java-1.8.0-ibm-devel-1:1.8.0.5.5-1jpp.2.el7
  • java-1.8.0-ibm-jdbc-1:1.8.0.5.5-1jpp.2.el7
  • java-1.8.0-ibm-plugin-1:1.8.0.5.5-1jpp.2.el7
  • java-1.8.0-ibm-src-1:1.8.0.5.5-1jpp.2.el7
  • java-1.8.0-ibm-1:1.8.0.5.5-1jpp.1.el6_9
  • java-1.8.0-ibm-demo-1:1.8.0.5.5-1jpp.1.el6_9
  • java-1.8.0-ibm-devel-1:1.8.0.5.5-1jpp.1.el6_9
  • java-1.8.0-ibm-jdbc-1:1.8.0.5.5-1jpp.1.el6_9
  • java-1.8.0-ibm-plugin-1:1.8.0.5.5-1jpp.1.el6_9
  • java-1.8.0-ibm-src-1:1.8.0.5.5-1jpp.1.el6_9
  • java-1.7.1-ibm-1:1.7.1.4.15-1jpp.2.el7
  • java-1.7.1-ibm-1:1.7.1.4.15-1jpp.3.el6_9
  • java-1.7.1-ibm-demo-1:1.7.1.4.15-1jpp.2.el7
  • java-1.7.1-ibm-demo-1:1.7.1.4.15-1jpp.3.el6_9
  • java-1.7.1-ibm-devel-1:1.7.1.4.15-1jpp.2.el7
  • java-1.7.1-ibm-devel-1:1.7.1.4.15-1jpp.3.el6_9
  • java-1.7.1-ibm-jdbc-1:1.7.1.4.15-1jpp.2.el7
  • java-1.7.1-ibm-jdbc-1:1.7.1.4.15-1jpp.3.el6_9
  • java-1.7.1-ibm-plugin-1:1.7.1.4.15-1jpp.2.el7
  • java-1.7.1-ibm-plugin-1:1.7.1.4.15-1jpp.3.el6_9
  • java-1.7.1-ibm-src-1:1.7.1.4.15-1jpp.2.el7
  • java-1.7.1-ibm-src-1:1.7.1.4.15-1jpp.3.el6_9
  • java-1.8.0-ibm-1:1.8.0.5.5-1jpp.1.el6_9
  • java-1.8.0-ibm-devel-1:1.8.0.5.5-1jpp.1.el6_9
refmap via4
bid 95808
confirm
debian DSA-3774
mlist
  • [oss-security] 20170125 Re: CVE MLIST:[oss-security] 20170123 CVE request: lcms2 heap OOB read parsing crafted ICC profile
  • [oss-security] 20170125 Re: CVE request: lcms2 heap OOB read parsing crafted ICC profile
sectrack 1039596
suse openSUSE-SU-2017:0336
ubuntu
  • USN-3770-1
  • USN-3770-2
Last major update 10-01-2024 - 18:26
Published 03-02-2017 - 19:59
Last modified 10-01-2024 - 18:26
Back to Top